Symbolism of 9/11: The Hand of the Architect and the Pentagon

The first parts of this article will look at explaining what happened at 9/11 in terms of Architecture and then focus on some Masonic symbolism which to my knowledge appears to have been overlooked and not covered by anyone else. Some of this article references videos made by the America Institute of Architects (AIA): Truth for 9/11. It is in no way intended to plagiarise nor imitate AIA’s sterling work, only for the purpose to exemplify some of AIA findings for the intent of comparison and reference architectural science and theory.

Subjects contained within this article include:

  • The investigation for 9/11 truth by the AIA (American Institute of Architects)

  • 9/11 and its position as a Conspiracy theory

  • 9/11: The Inverse Kinematics of Architecture

  • Zero Resistance

  • Inverse Kinematics In the Demolition of 9/11 Explained.

  • What should have happened to WTC7

  • Symbolism of 9/11: The Hand of the Architect and the Pentagon

  • The Draftsmans Pencil

  • 9/11 Symbolised The New Era of Artificial Intelligence

  • Microchipping: The Digital Square and Compass

  • How does 9/11 relate to current events?

AIA: Architect and Engineers of America vs the 9/11 Conspiracy

In 2011, the well established firm Architects and Engineers of America “AIA” came to the forefront of the media proclaiming that all three World Trade Centre buildings were brought down in a highly co-ordinated controlled demolition during the events of Sept 11th 2001.

I’m sure that myself like many others who have long supported this theory, will feel a sense of duty is being for filed in the quest for truth now that real scientific data is being brought forward. Supporting a view that the events of 9/11 were different to the government version of things runs the risk of ruining ones reputation and the risk of being placed on a terror watchlist.

I have been fortunate to see the Twin Towers with my own eyes, just over a year before the attack happened and they were a magnificent sight. As a fondness of memory, the shear scale of these building was so enormous that even from a few blocks away, I had to have my head tilled right back, just in order to see the summits.

I am a person since the day it happened did not believe that 9/11 was a terrorist attack in the way we were led to believe but was an inside job that was used as an impetus for a war on the middle east.

I do not believe that holding these views is the reason I became targeted. I know that I was targeted already. It was perhaps was I was identified as having the potential and ability to question and rationalise situations such as 9/11 from early on.

As far as citizens are concerned, even if you were not targeted beforehand, just even researching the event increases a persons chances of being placed on a watchlist. The point of MK Ultra was finding a way of de-educating the populace, just for the purpose of events such as 9/11 and also identifying those with intelligence. Fortunately, due to the need for skilled workers, not every person can be dumbed down nor can they be cloaked from the truth for too long.

Where the events of 9/11 are concerned, to understand that a demolition team would have been needed to bring down the towers would only require some kind of knowledge or background in art and design. Therefore, if one has “creative potential” which is the case in art and design, these individuals will likely be increased in potential threat the more experience they develop especially if their career paths move into the fields of sciences. Therefore, capping knowledge within the education systems has been a progressive task.

Art and design is a very difficult business to make money and therefore it is a subject in the schooling system, that over the years has not really been treated with much seriousness, yet there is a lot of money to be made if you have the talent. A degree course in Architecture for example can take over 5 years to complete. As far as money is concerned, this is a very expensive branch of academia. Therefore, many talented individuals develop their own skills, in their own way.

Therefore, people with these sorts of traits tend to have the ability to rationalise, question and see things for what they are. Therefore, those who work in the fields science and architecture will be at the highest risk of targeting where 9/11 is concerned.

9/11 as a Conspiracy Theory

The 9/11 event is perhaps one of the most devastating events ever witnessed by the world. Because so many questions have gone unanswered for so long, the whole situation has been open to much speculation from many areas of opinion, science and what seems to be a surge in what we can class as the anti-conspiracy theory.

The most recent example of this is the Flat Earth theory. The Flat Earth Theory is actually one of many false flag operations introduced onto the internet with the intension to disrupt public belief systems (science/religion) using highly trained operatives, most of whom are highly trained public speakers and negotiators, posing as regular people. False flag operatives also feature on other conspiracy subjects, especially the more recent Gangstalking/Organised Harassment conspiracy videos.

The flood of False Flag conspiracy videos is due to the fact many people have cameras and audio on their phones today, so special operations have to work differently to the way they used to in order to deal with any potential incriminating evidence being captured by civilians. If anything, 9/11 is one reason why these operations. Considering mobile cameras with video/audio capabilities did not exist in 2001, many people were able to film very important bits of evidence with camcorders and have over-time been uploaded to internet video channels.

False flag information intends to mix with the less informed individuals in order to create and solidify the conspiracy theorist into the minds of the nation as some sort of mental illness. Therefore disinformation will spread to those whom have a more open minded attitude who will inadvertently help to compound the false idea.

There are many individuals I have observed in False Flag videos whom challenge those who hold the real world beliefs of mathematics and physics. The challengers are by nature very clever “speakers” who can put across very convincing arguments. They have a tendency to latch onto aspects of a subject which they know can be difficult to challenge and make it their main focus. This is normally portrayed with a mocking, arrogant demeanour which is clearly well practised.

Some of these aspects are quite commonly seen in Organised Harassment and it is part of a training program where members are taught how to be persuasive and control conversations. In fact, the tactics are also quite commonly seen in professional negotiators used by armed forces, police services and even emergency services. But these tactics are used almost exclusively used by public speakers such as politicians. In some secondary schools and universities, students may be invited to attend debating societies where many of the skills of public speaking can be learned.

Therefore, the people whom feature in these government sponsored propaganda videos are known as “Poker Face” artists, or Poker Face conspiracy theorists. They are required research well in advance before making a video or several which are intended to challenge other peoples videos.

9/11 has been the feature of many False Flag video campaigns which have branched out in attempt to sabotage the obvious by encouraging the absurd. Those whom are part of the “Truther Movements” are targeted often in order to promote false information, not because they intent to but simply because they question, they will run the risk of talking about these theorys to others whom will likely ridicule them, therefore increasing a stigma.

For example, one 9/11 video debates that the airplanes used to attack the World Trade Centre were not real but were holographic projections, yet the rest of the theory maintains that the buildings were then brought down by controlled demolition. It is these kinds of theories that do the most damage because wither the video was made by an individual or made as a false flag, they both encourage a negative idea against those whom can see the reality of what is happening.

This video of AIA Truth for 9/11 is a good example.


A history student seen on the left with glasses, attempts to use his academia to discredit everything Richard Gage is saying. This individual has many traits of a False Flag “Poker Face”. Unfortunately, these tactics don’t tend to work when those challenged have a scientific background. So, even in the face of the trolls, AIA seems to be in a strong position already to take on the challenge.

If 9/11 does go to independent investigation and proved to be a controlled demolition, the entire situation will be turned on its head. This will begin to ask more questions such as:

  • Who was responsible?

  • How were the buildings rigged to detonate so intricately without anyone noticing any explosives prior to the event?

  • The legitimacy of the aircraft used to crash into the buildings and wither they were actually taken over by terrorists at all.

  • Was there a demolition team stationed to oversee the event and where were they located?

  • Why the Twin Towers was considered to be expendable along with human lives of American Citizens.

These aspects are areas which reside in the more darker areas of the attacks, ones which are covered in various videos across you tube. It is an area I’m sure the AIA are very aware of and likely to risk some serious pressure as they pursue an avenue for an independent investigation.

Inverse Kinematics (of) Architecture: The Architect Code of 9/11

AIA’s involvement in 9/11 is now a very interesting because even though there are many conspiracy videos on the internet which blame 9/11 on the acts of secret societies, there is actually one very strong, irrefutable link between 9/11 and that of the Secret Society of Freemasonry. Architecture.

Freemasonry is of course a Secret Society whose foundations come from that of builders, craftsman and of draftsmen/architects. It has led me to believe that 9/11 was a very well constructed event, planned years in advance which was intended to symbolise the Grand Architect of the Universe and the birth of Artificial Intelligence.

Just recently, a technology company called Three Square Market which is based in Winsconsin announced that it has began a program where staff can volunteer to be microchipped with new tracking technology. Microchipping is something that has been around for few years. It is also something that has been reported to have been experimented with illegally by major tech companys on un-consenting civilians.

Some have heralded this technology as the “Mark of the Beast” emanating from the Bibles Book of revelations. Whilst I do not hold Christian belief, I do believe that the Bible is a form of codex or plan.

In 9/11, there is one event where the “microchip” is referenced very cleverly. This symbolism is found in the event at the Pentagon which is not part of the AIA investigation. This is covered later in the article.

Inverse Kinematics.


A workshop video featuring aspects of Kinematics

Amongst the wealth of information that can be found on the internet articles and videos about 9/11, the “coincidence” patterns were in fact, one of the first “conspiracies” to emerge not long after the attacks. Although there were rumours that 9/11 was an inside job, there were not any real video sites available in 2001 to demonstrate why this was. Until around the time you tube was launched on the 14 February 2005, these theories were confined to independent internet pages.

There have been many interpretation of the 9/11 events, right down to the significance to the numbers of the dates, planes involved and so on. All these suggest that the events of that day were planned well in advance.

This article is about how the links I have found to the date of the event suggest that 9/11 was a mass ritual event that is likely to be of Masonic origin, where architecture is their primal forte. In terms of symbolism I am currently preparing a secondary article which looks at other aspect to the events which involve Occult symbolism which in turn converge with principles found within sacred geometric architecture.

I stumbled across Inverse Kinematics by chance. This was through looking at the date of 9/11/01 and transposing it to letters. 9/11/01 transfers to I.K.A in the English alphabet and it just so happens that I.K brought up Inverse Kinematics in a google search.

What I debate I.K.A stands for is Inverse Kinematics (of) Architecture. This is fundamentally speaking, the computer architectural mathematics that was used by the demolition teams to pull the buildings down in a timed co-ordination, including the plane crashes.

Kinematics is branch of architecture which is broken into two sets. Forward and Inverse.

Inverse Kinematics deals with the mechanics of free falling projectiles under the influence of gravity. However, Forward Kinematics applies more to resistance forces needed to compensate for the pull of gravity. Simply put, it is the mechanics involved of lifting and dropping whilst maintaining integrity of a structure. For example, Kinematics are used when designing robotic arms in manufacturing industries, ones which have to deal with lifting and lowering objects that hold a large mass and require delicate handling. Therefore, Inverse Kinematics is used in controlled demolitions in order to plot the lowering of a building to the ground using timed removal of each supporting joint. The removal of these joints has to be almost instantaneous in order for the building to fall correctly. Any failure to do so means that the building could topple over causing immense destruction to anything surrounding it. The only way to remove these joints fast enough is to destroy them completely with explosives. It is not only the quickest way to level a building but also the safest providing the blast zone has been completely evacuated.

Zero resistance

Zero Resistance is a term drawn from Newtonian physics. In Kinematics, Zero resistance can be represented as an equation to account for the natural pull of gravity that acts on all objects with mass. In 1687, Newton published a book called the Philosophiae Naturalis Principia Mathematica in which he presented his theory of universal gravitation and three laws of motion. In architecture, these laws apply just as much then as they do today.

Watch any AIA you tube video and it is stated that both towers, including WT7 came down in a free fall manor with zero resistance.

Zero resistance happens when an object falls at the pace of which gravity is pulling it, without obstacle. In theory if we were to drop a feather and an apple from the same height, both objects should touch the floor at the same time.

However, nature does provide natural resistance in the form of the air particles around us, energy which is found of the form of Gasses, such as Oxygen. This means a feather and an apple dropped from the same height will not land at the same time. This is due to the resistant mass of air being spread out in the atmosphere. Therefore a feathers light resist mass has to compete with air particles as gravity draws it towards the ground.

Where heavy objects are concerned, the resistance of air is almost non-existent.

This famous feather and apple experiment was conducted on the last moon walk of Apollo 15 by Commander David Scott in 1971 to show that in a vacuum, zero resistance will allow all objects of any mass to drop to the ground at the same speed and time relative to the pull of gravity. Instead of an apple, a hammer was used in order to show that heavier objects will fall at the same rate as lighter objects.

It proved the laws of Newtonian gravity worked. The fact we were able to go to the moon and conduct this experiment is beautifully poetic.

Supporting weight is the key here. When Architects design buildings, one of their jobs is to consider resistance in order to keep the building upright and standing. One critical aspect is that of withstanding weather conditions. In terms of structure resistance, skyscrapers need to be able to resist the most extreme bad weather conditions such as gale force winds. Gale force winds exert huge amounts of force, forces which are far more in strength than that of one plane crash. Take into account, these buildings have to resist these conditions 24/7, year after year and they never fall.

Therefore, a building such as The Twin Towers had to act like a muscle, stretching, twisting to adapt to ever changing conditions.

This is exactly what Architects and engineers do when they build resistant to specification buildings, ones that can withstand plane crashes, earthquakes and other potential disasters such as spreading office fires. The Twin Towers were built to resist a plane impact to specification but no building will ever fall down in its entirety with zero resistance unless under controlled demolition.

Inverse Kinematics In the Demolition of 9/11 explained.

Although Newtonian physics is mentioned in the AIA Truth for 9/11 documentary, Inverse Kinematics isn’t referenced directly but is explained in the parts about controlled demolitions. In order for all of the buildings that fell on 9/11 to come down in the pancake effect that can be observed in the TV footage, Inverse Kinematics would be needed to calculate and balance the fall of tons and tons of free fall material in an ordered way.

This specifically involves the severing the joints using explosives, timed so any resistant mass would be taken out of the equation. If timing was not correct, parts of the building could be left standing leaving a dangerous clean up operation in its wake. What we should also take into consideration is if something that is free falling hits another object in a specific direction then that objects energy will impact the other. That would also have to be managed in order to minimize surrounding damage.

This whole scenario can be compared to a retracting muscle, pulling something down. Every action interacting with the other in tandem. The energy or force used to do that is merely the power of gravity acting on the building as the supporting joints are destroyed in synchronization. In terms of equivalent energy needed to free the entire structure to hand its resistance over to gravity, the explosives required would have to be powerful enough to melt the resistive properties of the metal construct used in the skeleton of the building. This is why the AIA team were looking for evidence of explosive materials after the disaster in which they discovered Thermite. Thermite is a very powerful, high temperature burning explosive. Compared to the explosive nature of the initial plane crash, small explosions against the scale of the building would have been extremely difficult to notice but are observable in video evidence.

AIA’s first focus in their investigation is the WTC7 building. WTC 7 was not hit by a plane so this makes for a case study to compare it to that of a building demolition. In short, the fires in WTC 7 were confined to one level and were not hot enough to collapse an entire building in the way that they did. With computer simulation aligned against the original footage and the measured fall time approximated to 7 seconds. This has been observed to be the fall rate constituent with zero resistance.

The Twin Towers however were both hit in positions where any collapse would have occurred from the point of air plane collision. This means that any structure failure above the plane crash would be meet by the physical resistance of the building underneath. It is why many have wondered why the top part of the building didn’t slide, fall off the top or stop falling once the upper half had wasted its downward potential energy. This means the collapse would have stopped somewhere just under the area of the plane crash. In comparison, both the North and South towers took around 12 seconds to fall from top to bottom which is consistent with zero resistance free fall.

WTC7: Indications of a Demolition Operation Failure

It would seem that under the scenario of a controlled demolition, WTC 7 was the only event that day that did not go according to plan. No plane hit this building at all nor were there any fires inside it strong enough to melt steel, yet it was packed with demolition explosives.

There seems to be indications that the events of 9/11 did not go to plan and those reasons have to do with the nature of the demolition and the plane crashes.

It is possible that when the planes hit the Twin Towers, the buildings were meant to come down either straight away or just after the crash. Structural damage in the first tower caused by the plane crash might have severed connections within the demolition circuit or to a wireless receiver. It could explain why the second tower to be hit came down first and why WTC 7 was pulled without any evidence of a plane crash. WTC 7 was likely to have been setup to fall once the North Tower had produced enough cover from dust debris, hiding any evidence of a demolition pull.

Therefore the second tower might have been pulled first as a distraction in order for ground crews to restore connection to the first tower and WTC 7. It seems that whoever was in charge of the whole event decided that WTC 7 was too risky to be left standing, and was detonated to remove any trace of explosive material.

It has been debated by many that WTC 7 was the outpost for the demolition crew. Personally think that WTC 7 was not used as an outpost for the demolition crew but were located somewhere nearby, high up and out of the reach of the blast zone.

Symbolism of 9/11: The Hand of the Architect and the Pentagon

The World Trade centre was designed by Minoru Yamasaki and opened on April 4, 1973.

There seems to be symbolism within the events of 9/11 that the building fell under the hands of an architect(s) or draftsman and that the date it was meant to happen was planned many years in advance, possibly with the intention to be destroyed. Wither Minoru Yamasaki had integrated this into the planning of the building is debatable.

As pointed out, there are many aspects of 9/11 that seem to link but too coincidental to be chance. The most notable is that of multiple references of the number 11 (intended to represent the Twin Towers) and 911, which is the phone number of the American emergency services. Just researching 9/11 and Occult numerology can bring up many results in a Google search.

But from what I can deduce, this event seems to be one that has aspects of a Occult ritual that primarily revolves around architecture or at least the death of architectural construct that once represented the unity of two entities.

If you have read my blog posts about the Occult, then you many have learned about Sigils or Hyper-Sigils associated with Chaos Majick. Now because Sigils are primarily a design form, architecture holds functional purpose especially when thoughts become things. Except the mechanics of physics have boundaries, therefore become rules. So where architecture comes against the laws of physics, there is no room for exploitation of rules. Simply put, in architecture, you cannot design anything and expect it to work in any fashion you want. This applies throughout in the Occult, and it is why Freemasonry hold Architecture and Geometry to be so sacred.


The term 9/11 holds the first key. I/K. The more you look at this, the more revealing it can be. For example. The pillars of the I and the K. The letter I can be made into K once two lines are drawn in towards the central line making an arrow. It can also represent a force. In this case I can be compared to a plane hitting a tower.

The slash dividing the I and K is the problem and solution. It represents a draftsman pencil and a falling building. As the pencil rests in ones hand in is supported by the fingers and the shaft rests along the muscle and joint of the first knuckle, angling as the pencil touches the paper. It is meant to symbolise supporting structures.

Try this for yourself. Put a pen or pencil in your hand and observe the shape in which your fingers and thumb rest around it as if you were about to draw something.

The shape your hand is making holds a sacred geometry secret which represents two polygons. The Pentagon and the Hexagon. When holding a pen/pencil, all joints that form around in the shape of a pentagon if we to hold the pencil so that the first and second joints of the index finger are straight.

If we were to start drawing, our index finger would work around in a way that the joints will go in-between a five and six polygon shape. This makes the “joint”.


Architect Pentagon

The Pentagon was the final building to be hit, one which holds the mystery. It symbolizes the destruction of the towers under the hand of the architect. As many videos of the Pentagon attack show, there is no observable evidence of a plane hitting the building. In fact many eye witnesses stated at the time that it sounded or looked like a missile. The missile is meant to represent the pencil of the draftsman whom plotted the destruction of the building. But it is also meant to represent a message for the future. The Microchip Implant.

9/11 Was Intended To Symbolise The New Era of Artificial Intelligence: The Pentagon, Three Square Market and Microchip implant.

For those whom don’t know much about Targeted Individuals, many have had microchips inserted illegally for the purpose of human experimentation. Some of these individuals have had microchips implanted much like the ones that Three Square Market have been reported to have been offering their own employees under voluntary option.

As see in the structural damage of the Pentagon, the missile which penetrated the South West wing of the building is intended to represents the penetration of the chip into the muscle between that of the index finger and the thumb.

There are many different chips used on different targets, some so advanced they won’t be seen for some years to come. Therefore, the chips being used by Three Square Market are relatively primitive in comparison.

MK Ultras have Microchips inserted in a different position. This is located between the index finger and the second finger. This represents the Compass, where the chip between the thumb and index finger represents the Square. This makes the Square and Compass of the Masonic emblem.

From what I can gather the Compass represents microchips used in illegal/secret testing where the Square is for role out social post-experimentation.



In this image of the Masonic emblem, the screw which binds the the Compass is the representative placement of the electronic microchip implant. It is also known as the “Screw” in relation to the term “Turn of the Screw”.

 As see in the structural damage of the Pentagon, the missile penetrated the South West wing of the building. This represents the penetration of the chip into the muscle between that of the index finger and the thumb.

If a person was to recieve a Microchip in both hands, then it would represent the Square and Compass. With a enough implants inserted, this would make up the human index, hence why they flank the index finger.

The Draftsmans Pencil.

A pencil can be cut in a few ways so that it can fit well into the hand. Considering the shape of our hands which can vary, some can be rounded, where some are cut in polygon shape. The Pentagon is also likely to represent the Architects hand and pencil, where the pencil has been worn down to the nub. Thus, this represents the workings of the pencil on the paper, worn to the nub and can be taken no further.The missile sent into the Pentagon is another metaphor/symbol of the draftsman.

If somewhat weird, the final plane crash United Airlines Flight 93 happened in “Pennsylvania”. In terms of linguistics, this needs no further explanation but it can be concluded that the play on words indicates that all aspects of the events reference architecture.

9/11: Draftsmans Pencils

This one I admit is a loose connection but worth consideration. In some Occult numerology, …. Numbers higher than 10 can be added together using each unit. This is normally done as a code to represent aspects of an event that is due to happen.

Therefore: 9/11 can be written as code:

9/1+1 makes 9/2

Because the 9 has not been altered, the two could be considered to be adjusted into a letter. That letter would be the second letter in the Alphabet “B”.


This can be referenced a 9B Draftsmans pencil. Draftsmans pencils range in a set from Hard (H) graphite to Soft (B). Most pencils used in schools and offices everywhere around the world tend to be HB pencils which are made with a balanced graphite of soft and hard.

In Art and Design, there is much Occult knowledge between the tools and symbols.

The 9B pencil features a soft graphite which on paper produces thinker darker lines that the polar opposite 9H pencil. The softness of this graphite when drawn on to paper is very easy to smudge, making B pencils useful for shading. This means that the hard pencils are used more for sharper, angular and lighter construct lines.

Therefore the quality of this 9B pencil is that of shade and blending or to hide cover.



There’s Something about Mary: Modern Stalking and Technology in film.

I am not a person whom likes to compare the TI experience to films, no-matter how true to life they can be but there is one film that stands out as a perfect example of how psychological manipulation can be achieved using standard electronic equipment.

The film ‘Theres something about Mary’ released in 1998 makes a major Faux Pas in terms of what is happening to targets today. It also personifies the entire problems of modern day hacking and survellience.

The film centres around two significant issues. Stalking and illegal survellience. By todays standards the equipment seen in the film is quite primative but observed to be exceptionally effective. The types of equipment seen in the film are real and is still used for spying by the intelligence services, police and private investigators. A majority of it can be legally purchased from the internet if one was so inclined.

Useless you have access to bug detectors or devices that can detect long range scanning equipment, then the techniques used by the investigator in the film are just as effective at psychologically manipulating a person today as they were then. Interestingily, the films central charater Mary (Cameron Diaz) and her roommate both have access to survellience equipment themselves, yet is still manipulated. Her stalker is always one step ahead. The irony the irony that another of Marys stalkers Tucker (Lee Evans) is the only person whom makes her aware of that the person she is dating Healy (Matt Dillon), isnt who he says he is.

‘There’s Something about Mary’ was released at a time before the arrival of social media, smart phones and the AI that can be found on them. More primative survellience can perhaps play a more important role than modern tech.

The most obvious is coincidence which can be observed when Mary mets Healy, the private eye sent to track her down by her childhood sweetheart Ted (Ben Stiller). Healy whom whom instantly falls in love with Mary uses survellience equipment in close proximity to her property to detail as much of her life as possible before introducing himself. Their first encounter sees Healy attempting to appeal to Marys personal interests and passions of which in reality, they are of polar opposites. This works at attracting Marys attention which was otherwise dismissed by her first impressions.

The second is that modern tech leaves a digital footprint which has the potential to be tracked thus leaves more of a chance of locating the source of hackers which could be all means have access to ones audio and camera at any given time, should the device be comprimised. In the film, it is mobiles and land lines that are tapped using long range scanners. Otherwise, the charaters do not have a real-time visual view through cameras which were not found on mobiles in 1998. Most mobile calls being monitored in the late 90’s were logged by telephone number by intelligence services and some TIs were used to test future systems separate to that of law enforcement. Those that would be involved would be classed a special-ops.

The third is that it is now common knowledge that internet companies extract our data. It is by all means legal should you agree to the terms and conditions. Proving if that information has been used illegally is exceptionally difficult considering that it could be anywhere in the world, but there is always the likelyhood that it can be traced through error. Considering hacking groups and whistleblowers are now commonplace, the threat to those which conduct illegal survellience is much higher. Therefore, non-internet connective devices are less likely to be traced and a sign that pre-internet technology has some major advantages in effective harassment campaigns.


Modern Stalking.

As I have maintained, the majority of tactics used by perpatrators within the community are not all state sponsored spies but are in fact just common criminals. However, they can sell this information on to intelligence agencies without realising it which adds to a complex problem of how many sources are active on one person at a time.

Individuals whom spy illegally are exceptional useful to intelligence agenices. They are people whom are marked in the system as criminals but are allowed to continue what they do because of what they do.

This does not mean that targets are not exposed to real-time observations by intelligence agencies but it more the fact they have to be distanced as far as possible from illegal activity that could comprimise operations that they undertake on everyone through digital extraction. This makes criminals in society far easier to manipulate than before and thus can be brought into the harassment programs.

Main operatives employed by intelligence agencies are ones that tend to reflect more real-time coincidences, that is information leaving your digital devices as quick as you could be having a phone conversation with someone you know. Secondary operatives (Criminals/vigilantes) are used as counter measures where illegal survellience is at threat of being exposed. These individuals are of course more at risk of imprisonment and blackmail simply because their activities were or are not state sponsored. However, they are used more often than intellience agencies because again, through law, these activities, if it ever went to court, could be blamed on citizen crime rather than the state.

In terms of the Syndicates which employs perpatrators is another aspect altogether and are normally intergrated inbetween law enforcement, state sponsored spies and controlled organised crime. These individuals work for companies concerned with deeper aspects of projects that involved artifical intelligence and development of weapons/drones/android/machine tech. They are not all computer specialists, but have been identified as possessing qualities that the company requires and not always to do with their moral backgrounds.



For my readers…..

Here is a list for my readers of the top ten most viewed blogs on this site since gangstalkinginfo wordpress started almost a year and a half ago. Thank you for your support and time.

Corrosioninfo: Most viewed Blog Posts

  1. The Divinity of Gold: Cern and other Wormholes.

  2. The Occult and Gangstalking Series. Part 1

  3. Occult and Gangstalking Series Part 2

  4. Deconstructing Gangstalking: What Gangstalking is, how is it conducted and scientific principles.

  5. GB Wills: The Illegal UK Register of Targeted Individuals

  6. Community Based Harassment: Targeted Individuals and the Legal System

  7. The Target

  8. In Response to Tamil Vendhan (Twitter conversation)

  9. The Eye Thanks. An experience of Gangstalker Extraction AI Tech. November 2015.

  10. Thoughts on Max Spiers

UK Codes of Vehicle Harassment

Over the years I have observed how perpetrators have incorporated a form of psychopathy into the representation of data that mirrors targets. Most harassment conducted in vehicles is designed to blend in with other traffic and considering how it is performed, it is difficult to spot but it is present around targets and others in frequency.

The most obvious signs of vehicle harassment is found in the the registration plate as it is the most attention drawing of a vehicle next to advertising.

Typically, a perpetrator needs to get the attention of the target and a number of options are used in order to do so. The first is a private plate which can be more direct with a message. Advertising can also be used.

Vehicle matching

Perpetrators use a tactic which involves using transport known to the target. These could be cars owned by family or friends even those owned by ex-partners or work colleagues and so on. Normally the pattern incorporates a few of these cars with reg plates that can reflect aspects of the targets life.

The most obvious reflection is that of the targets mode of transport but this can depend on the circumstance.

Colour matching

Colour matching is the tactic is one that is the most stigmatised in gangstalking. It is known as the “red car” tactic. There is already a description of this in a previous blog.

The types of reg plates used by operatives sometimes depend on the person and what they notice. What they notice is dependant on their circumstances, however, this does not mean operatives will not attempt to introduce new codes to gain the targets attention.

Common Harassment Reg Plates

Many of the plates mentioned are very common on our roads, some less so simply because of their implications.

Emergency Services:




MI1 to MI9. MI5 most common.

Law Enforcement

DI or represented as 49: Detective Inspector

PC OR P3: Police officer

Public services.

GOV/70V/V07: Government

PIP: Personal Independence Payment

ESA: Employment Support Allowance

DWP: Department of Work and Pensions

CAB: Citizens Advice Bureau (Played upon a lot. It is also code for Taxi drivers or firms that provide information in exchange for money.)

UBR: Uber

Health Services and Mental Health References:

MH or MHS (mental health services)

ECT: Electro-convulsive Therapy

NHS: National Health Services

References to name of individuals/employees involved in care. Normally shortened to fit in the last three letter spaces of the reg plate. Commonly used after appointments or contact with health services.

WRD (Ward) Has used as a threat and injunction with a number of tactics. This one has been tested recently and has incorporated companies with the word ‘Ward’. One particular vehicle gained attention by undertaking on a motorway.


LSD: Most commonly used. This is sometimes used to gain the attention of the target to more specific details of what is around them. In regards to synthetically induced mental manipulation, the tactics deployed are carefully presented in a way to induce a variety of emotional states, sometimes subconsciously. These are normally done as a well co-ordinated effort of many pre-planned factors. To a target whom is not knowledgeable to the tactics, one can experience severe emotional states and assume they themselves are not well. These can also incorporate a wide variety of street theatre and orchestrated actions designed to cause the target to make mistakes.

In these situations, an attempt at causing a collision can be very much predicted in most situations. Most times out of all, these tactics are abandoned for a while so to avoid drawing to much attention to operatives.

XTC: Ecstasy. (Can also mean ex-stasi/former operative turned TI or retired.)

MED: Medication

Secret Societies/Religious/Occult Reference:

666: Commonly reported on plates and not always perp activity.

AC or 13: Aleister Crowley/ Witch Coven

OTO: Ordo Templi Orientis. An international fraternal and religious organization founded at the beginning of the 20th century by Carl Kellner and Theodor Reuss.

AA: A∴A∴ Thelema (Aleister Crowley)

33: Masonic degree

G: Freemasonry/Geometry. Normally seen as G*** ***

I (i): Eye or aye (acknowledgement). Can also represent the All Seeing Eye.

Body and Physical:

BCK (Back)
HED (Head)
TOE (Tow)
BLO (Blow)



911: September 11th Attacks 2001

TI: Targeted Individual. Very commonly represented as TI** *** on standard plates.

ATS: Above Top Secret (website)

JFK: John F Kennedy

CBH: Community Based Harassment

Internet and Technology:

AI/19: Artificial Intelligence

PC/ITL/AM: Personal Computer (not commonly used due to confliction)

HD/84: Hard drive/High Definition

ATT: AT&T. Can also act as a broad term for mobile networks.

Colour Orange: Previously used to represent the Orange mobile network in the United Kingdom. Now know as EE (55)

AOL: America online

NTL: Still used today to represent the internet provider Virgin Media.

BT: British Telecom

Media and Television


BBC/223 or combination: British Broadcasting Co-operation


C*** OCK




British Year Plate Uses:

C: See
V: Hand gesture
U: You

CU: See you or You See. UC will be CU and code will be back. For example


CU91 MSI: Is MI9 you see.


CU can be followed by initials of the target if in range.

CU11: AA
CU12: AB
CU13: AC

All the way to:

CU99: II

Otherwise initials from j to z are covered in the last three lettered spaces as well as A to I.

Sexual References:

69: Sexual reference or star sign of Pisces

71Y: Gay/Homosexual

FKG: Fucking

OS: Oral Sex

BJ: Blow-job

Hand signals and gestures.

Know or knows: Rubs nose.
Here or to hear: Touches ear
I: Touches eye.

Pyramid: Driver rests arms on wheel to meet hands in middle.




Road maintenance:

Road maintenance signs can be used in a variety of ways, some quite creatively.


This method of harassment is normally used in an area where motorways are close to the target. This creative targeting is designed to make the target think about what the sign is implying.

The foremost is that the sign implies a warning to other operatives that the TI is ahead of them. However, this is only used as a confusion tactic and it is normally incorporated where a TI begins to analyse the systems of harassment. It is meant to take the targets mind of the real technology being used in order to control and manipulate traffic around the target and others.

Mobile works indicated by arrow.

Used on the inside lane when driver is passing. The reference here implied that illegal extraction of data mining and real-time surveillance works in terms of control.

In all, there are simply to many ways in which the combination of creative harassment can be used on targets to list. However, this list provides some of the basic codes that can be found.




Thoughts on Dr. Katherine Horton (stop007), Vice and Online Shilling techniques used against TIs.

Electroweak interactions and corruption psychopathy systems?

Behind every bit disinformation there is a purpose. Besides the obvious aspects of false information there is an area of modern conspiracy theory, one that can be also pigeon holed under “fake news” that has a purpose other than to make money or lead people away from the truth.

Dr. Katherine Horton (stop007) and her Associates

Dr Katherine Horton is an alleged TI whom is most noted for her you tube videos where she is seen sitting in front of aluminium foil sheeting. She also displays the use of a Faraday cage in order to block out frequencies that she claims the intelligence agencies using to bombard her with harmful radiation in order to slowly kill her rather than outright.

One of her videos shows her demonstrating an device which detects electromagnetic radiation within the  Faraday cage and most recently, methods of detecting implants with bug detecting devices.

The most interesting aspects about Dr Horton are her background.

Dr Horton states her professional work was geared towards psychology within human systems. The system in which she goes into the most detail is that of Psychopathy in organised corporate systems. She parallels this phenomena to that of individuals whom control in the pecking order of businesses and goes into great detail in order to explain how it works. She also compares this system to gangstalking/organised harassment.

Whilst this information has credibility, there is a major aspect of her background that seems to impose the assumption that she has exceptional knowledge about the technology being used against her.

A majority of surveillance technology and electronic arms are normally sold at specific expos around the world for the interests of law enforcement and the military. The …… expo held every year at Paris is the main event where tech companies come together in order to promote these types of technology.

This has no connection to CERN or Universities in or out of the UK other than research that is bought by outside sources for development. How Dr. Horton is able to portray her claims with credibility is more or less speculation through the use of deduction.

Most whom follow my wordpress and twitter with interest know that I am an advocate of self deduction. Especially when it come to organised harassment, one which is exceptional difficult to prove, I have always held that TIs should test what is happening to them in order to derive logic from the situation.

It is interesting that before Dr. Horton was even know of, I had written about the aspect of scientific principles of experiment, how they relate to harassment techniques and how they reverse themselves when the tactics are mirrored back, thus cancelling themselves.

Detection of Implants

Unfortunately, the only true test of discovering if you have an implant is to have an MRI scan certainly for the purpose of evidence. Therefore advocating the use of a bug detection device in order to isolate implants comes with quite a price tag, especially when all you have to go by is a sound emitter. If a doctor is willing enough to take your claim seriously to issue a scan, then the legitimacy of the detection device shall be revealed in relation to where it is observed to be. Therefore it is advisable to avoid spending a lot of money on something that could otherwise be detected with something that can see inside your body and to avoid ridicule from others whom will almost instantly judge you to be mentally ill, despite the reality of modern technology.

The Power of Deduction

The process of deduction and elimination is one a TI should never shy away from. This can help you as a person to remove assumptions that maybe being pushed by persons on the internet with the intension to mislead you. You may not experience the same things as others. You may have no history of mental illness nor any symptoms of hearing voices or indications of technology harassment.

From experience, those whom are the most resistant to manipulation are either those whom do not use much technology or non-at all. It is because they are not linked into the system like others are. Those whom carry a mobile, especially a modern one with cameras are almost certainly helping the system of indirect surveillance (not aware that their phone is spying on others as well as themselves).

In fact, when raising the point about psychological manipulation induced by Googles deep mind technologies in conversation with Dr. Horton, she very much brushed of the prospect with no concern.

However, Dr. Horton has no hesitation in portraying more extreme forms of persecution under the perception that she is being slow killed by directed energy weapons deployed by the intelligence agencies. Despite being willing enough to go on the internet, she is not willing enough to gain a single piece of evidence of harassment from the outside world which by all accounts is what a majority of TIs show is the biggest threat to harassment operations. If anything this would help strengthen her case.

Fact vs Fiction

A majority of the time, Dr Horton sits in a Faraday cage whilst also engulfing herself in aluminium foil. It is claimed that this helps shield herself from directed energy weapons. This is laughable from a scientific point of view and not because of the stigma associated with mental illness.

The Faraday Cage was designed to block out electromagnetic radiation whilst aluminium is used as shielding in electrical wiring in order to block out interferece. Therefore, to a reasonable degree there is some legitimacy in the use of tin foil.

Unfortunately, a Faraday cage as well as tin-foil can only block out specific frequencies and those frequencies depend on the type of protective netting or type of foil used. Therefore, the other frequencies that are not being blocked will pass through the cage. Dr Horton actually demonstrates this contradiction within one of her videos where she uses a Geiger counter in order to detect the signals as they continue to pass through her shield.

If somewhat ironic, the tin foil hat stigma is more or less a mockery of its low effectiveness rather than it doesn’t work at all.

Dr. Horton claimed that if she did not have this shielding she would have been dead. Then what would be the point of making these videos? Shouldn’t all other TIs be dead? This is a very strange scenario.

Coincidence: Dr Horton and the Heirarchy System

Dr Hortons attitude of assumed authority is another reason which leads me to suspect elements of shilling techniques.

In her most recent video SOS 8 – Evidence Collection (Targeted Individuals) (Stop 007) she states that if a person claims they are being electronically harassed and does not look ill or gaunt then it is likely that they are a perpetrator. Before this, she points to her face and makes a fleeting comment about “symmetry” as if to make the term sound an important part of how direct energy weapons are making her look ill. What symmetry has to do with this is anyones guess but seems clear that Dr Horton does not pay much attention to her pseudo-science. Dr Horton herself does not look ill other than looking like she needs sleep. Otherwise, she looks healthy. For a majority of her videos she looks well enough to present broadcasts in great detail and some without the protection of her cage.

Dr Horton presents herself as a person whom has authority within the TI community with an assumed her position to state what makes a TI or not. This is helped along by the presence of apparent “whistle-blowers”.

Lockheed Martin

In one video, Dr Horton and her sources claimed that the company Lockheed Martin were the company responsible for illegally targeting and experimenting on civilians. Although there is some legitimacy in this, what was overlooked is the glaringly obvious link to one of the biggest names in space exploration, NASA. Lockheed Martin have been the primary contractor to NASA for many years, delivering some of the most complex technology available.

As I had I covered in some Tweets, I had stated that NASA were responsible for some targeted experiments. Targeting of individuals has some individual qualities that parallel space exploration. Those are:

  • Isolation

  • High levels of Stress

  • Radiation Exposure

  • The use of digital communication

  • Repetitive scenarios

  • Medication

All of these promote self developed problem solving skills, hyper awareness and resilience to extreme psychological conditions. Albeit these conditions do not replicate the physical conditions. However, what is interesting is the advancements in technology which suggest that future space exploration is going to include AI and AI interaction.

Other observations of Shilling

Considering Dr. Horton has produced very lengthy and detailed videos about psychopathy in corporate systems, I’m sure she would have been careful enough to avoid slipping into the trap of sounding a hypocrite when discussing the pecking order of systematic torture. As far as shilling is concerned the whole scenario of her angle of what it is to be targeted, is surrounded by very sloppy and lazy inaccuracies which only shows she is a victim of her own self organised hypocrisy.

To others around the world whom might be watching, especially individuals whom suspect they are targets, this information is not presenting empowerment to others. In fact is presenting the opposite that of self absorption and that of subtly gearing the viewer towards her point of view and encouraging the viewer to spend a lot of money of bug detection devices and the like. None of these things are cheap and in terms of financially ruining targets seems a fitting tactic of indirect extortion and time wasting.

Around the time Dr Horton appeared, I had been messaged a number of times by a person on Twitter whom had attacked me based on the grounds that I could not be a TI because I did not use a Faraday cage. This is perhaps the funniest trolling I have experienced. TIs are somehow expected to acquire a Faraday cage or at least go along with a shills idea of that direct energy weapons are the primary source of harassment. The person behind this account also had something to sell, a book which was apparently all about their TI experience.

Compared to other TIs, almost all of Dr Hortons videos are conducted from home. A majority of TIs whom report harassment tend to incorporating observations of real-time harassment that can be seen, involving perpetrators, some of which are approached and confronted.

Of two of the most startling videos can be found are those posted by Nappy Head Roots (California) and Andrea Damask (Romania). Although, I have reservations about the legitimacy of their accounts, there are hints of genuine Stasi-esq tactics, ones which are used on myself.

Dopplegangers and the Art of Discrediting.

Not so long back, I wrote an article about Dopplegangers and how they are sometimes used to mirror the target. In terms of my experience, Dr Katherine Horton is a doppleganger of a perpatrator I came into contact with between 2009-2012. This person was also highly educated. So, this was quite a surprise indeed and more so because Dr. Horton had arrived on the scene not long after I wrote the article.

It would seem that perpatrators are working on highly creative ways of trying to discredit their own techniques by in fact using their own tactics in their own videos.

In terms of TI information, there seemed to be a bit of a race to force feedback the information I was drafting in wordpress. Bits of information I wrote seemed to be appearing in a different context elsewhere on the internet, be it facebook, the news or even in some advertising. The psychology of this was most fasinating. It was if there was a collabatorive effort to put me off writing the article and that the use of TI shilling was an indication that I should give up. I found this quite amusing and proved to me that this technology cannot read minds like it is assumed to. I was able to ignore these tactics and produce other information to counter what was happening.

CERN and Bio-Chemistry

Having talked briefly with Dr Horton on Twitter, I questioned what work she conducted at CERN. As most know, CERN is not a university as such. It is primarily geared towards particle physics by smashing atoms in order to understand their structure. To my knowledge, CERN does not have a department of Psychology.

 This may sound a bizarre concept but the bio-physical relationship of thought might be deeply connected to aspects of “telepathy”, a subject which is of great concern not only within the TI community but the whole world in term of technological advancement.

What does this mean?

Scientists have been attempting to understand and explain the origin of the “soul”  for sometime. So far the methods of attempting a gateway to the other side have involved the use of electronic scanning technology to isolate thoughts within the mind. This can also be labelled as “mind hacking.” I shall go on to explain how this relates to the gangstalking program.

Whilst under observation, visual and audible stimulus is used in order to prompt the brain to respond. In order to extract thoughts, the brain needs to be scanned in a way that neural pathways can be mapped. This means that one solitary memory can be isolated down to one neural pathway thus, this pathway can be activated under prompted command. The only way to see if it has been activated is through scanning the brain. So this neural pathway will light up like a beacon in the same place.

The problem for scientists is identifying areas of the brain which involve thought processes, that is, what you are thinking against what you remember. That again involves stimulus. It is also why the gangstalking program is likened to an extraction program akin to that of torture. The response you give will activate neural pathways which may allow an insight into your mind. This is where the trick of “mind reading” can be identified.

Normally, a concerted effort undertaken by Gangstalkers is usually issued out under the disguise of “organised harassment” or local community law enforcement.

It is however issued under experiment from CERN that links into supercomputers of the western world that are in charge of real-time observations of society. You could think of this as CERN represents the data crunching and project management of external operations. Once this information is processed, the slave computers are updated with new algorithms and projects.

Within the organic world of our minds is the quantum world and in terms of bio-physics, this is where things get weirder. Because we are made up of quanta, neurons and every single connection in our minds is linked to the infinitesimally small including quarks.

It is this realm of physics that scientists are most interested in. Therefore the influence of thoughts are just as important within the quantum world as they are in the larger world. This means that scientists are likely to be studying the link to thought patterns and quantum exchange.

How does this relate to Dr. Katherine Horton?

This again maybe extremely bizarre, but Dr. Horton might actually be a scientist whom is directly interacting and data analysing her subjects (human experiments) for the purpose of studying social interaction within the TI community. Therefore is could be true that she is whom she says she is except the point is to study and map the data across the web of those whom are targeted whilst using herself as a gineau pig.

Therefore to ease the blow, Dr Horton incorporates half truths and real aspects of gangstalking in order to draw in a number of responses for study.

Whilst I speculate this, if anything the stop007 project is one TIs should be highly cautious of in terms of the nature of the background of Dr. Horton.

TIs responses on the internet will like everything else be studied and will be used in ways to discredit individuals in the most calculated of ways. If you can appreciate that recently, more Tis are beginning to speak out, then a counter operation can be expected.

My Twitter account is rarely directed trolled and if it is, it is normally done discretely via private messaging. Over nearly a year and a half I have noticed patterns which suggest that there are efforts underway to dupe and extract information off of Tis.

Of one notable operation was that of the media agency Vice whom had been data analysing Twitter from around February to the point their report on targeted individuals was released. The Vice article about Tis contained some very interesting research that mirrored some very brief things I had mentioned amongst the majority of other TI information.

The Vice online video documentary which followed, featured Dr. Katherine Horton in the opening credits (to no surprise), most likely because the stigma of the tin foil hat joke.

As a matter of bias an editorial psychology, this was a classic case of planting a seed from the start and obviously a video I myself was never going to take seriously. Having blogged about Kerion Lee Perrin (whom was featured in the documentary) the year before having found one of his videos online, I was unsure to his credibility. Yes, tracking devices can be used and I do not doubt for a moment that the technology available to insert implants that can read our responses exists.

However, I personally have loose ties to Vice as one of their headquarters was located not far from a place that I worked as well as the local newspaper whom along with neighbouring organisations, actively participate in the program. My personal relationships at the time also had a lot of ties to these organisations and experienced very high levels of systematic harassment. Considering that a person assioiated with program has been coincidential mirrored as a doppleganger, I’d say that this has been a long planned event and it has gone exceptionally wrong.

As much as Keiron Lee Perrin has some startling information, I am of the opinion he is a shill and in fact anyone who has anything to do with Vice.

Vice it seems have been asked to take on a big challenge. That is to work out a way to discredit the targeted individual community simply because us, the targets are simply causing to many problems.

Who is mind controlled?

Many TIs do not realise that despite what they are subjected to, they are not mind controlled, regardless of if implants are used. They are in fact resisting it. Otherwise they would not be talking about it. What they are observing is a mind control program around them that is not working.

The only logical reason for this is very easy to point out.

Shills attempt to draw attention away from harassment operations on civilians, ones which many TIs know is what intelligence agencies do not want you filming for evidence.

Dr Hortons seems to be driven towards a message that TIs should isolate themselves rather than empowering themselves in order to live their lives.

From my point of view I hope to be wrong about Dr. Horton but I am afraid that the signs of a hierarchy developing within the TI community alongside shills might look to destroy the information people bring to the world via the internet.

However, with the realities of surveillance laws and hacking, none of these shills seem likely to succeed. Not all people are stupid enough to believe the bullshit. The fact the media had to develop a very disparaging documentary to ridicule something that is deeply intertwined with the medias own reporting on related subjects, only goes to show how far they prepared to go to keep this under lock and key.

Paranoid Schizophrenic or not. We are all being watched.




Neural Isolation and Electronic Stimulation Triggering: Controlling Your Mind Against Invasive Tech.

This blog gives advice to those that are experiencing un-usual thought patterns. What I mean by this is when you begin to experience feelings, thoughts or even voices that are not part of you.

The complexity of neural triggering comes down to the state of high tech electronic devices that have been scientifical designed with the purpose to distrupt brain patterns.

The premise of this technology is more simple in principle than many assume but in sciencific experiment the way they have gone about gaining access to the human mind has the use of practical methods of ‘problem solving incorporating psychology with technology.

In 2009-2010 BBC Horizon featured a programme called The Secret You which hinted at this technology. One machine featured in this program was able to predict the answers of a test subject 8 seconds before the person replied to yes or no answers. This experiment was conducted in a laboratory using a high powered brain scanning machine developed by the Company Siemens which coincidently design and make mobile phones.

Also in the program, Scientists were able to identify areas of the brain which stored memories through neural stimulation. This involved using a cap with electronic sensors placed on a subjects head so to observe brain activity. The subject would be shown various pictures , mostly ones found in the media and from history where each one would produce a response in the mind thus isolating a part of the brain where the thought would reside. For example, if you were shown a picture of a celebrity, the machine would be able to detect if you had certain feelings such as sexual desires, admiration, distaste and so on for this person based on the neural connections formed in the brain.

At the time of airing on tv, the program covers technology which would be quite primitive against todays claims of high tech neural weaponry.

Dealing with a problem such as distorted thinking involves understanding how the mind works first before dealing with the consideration that your own mind might be interfered with outside sources. We also must consider that if you as a person use or abuse alcohol and drugs that this is not the best thing you can be taking to establish if you are being electronically manipulated and also goes against your crediblity.

Reading on psychology and simple mind/emotional coping techniques are a good place to start. Despite the information regarding the mental health services, the recent intergration of “mindfulness “ and encouragement of meditative techniques are in fact highly useful. They are in fact the main techniques that will help you establish control over your own mind. However, it is advised that the use of psychiatic medications should also be stopped, especially neuroleptic mediations that induce severe drowsiness.

Neural “triggering” is something that you can not so much observe but “experience” unless your are of course the scientist on the other side whom is observing.

The problems is isolating the “triggered” thought which in essence is not a clear “voice”, but is simply a machine simulating parts of the brain with small electronic pulses.

The act of controlling someone elses thoughts is like that of a series of collisions or creating links in a chain, one impacting the other that create a “train of thought”, such as the expression, one precedes the other.

The predictability of ones thoughts and actions with todays modern technology has been made easier for scientists given the amount of data that is collected on us every second.

However, neural stimultation is a level too far.

Meditation Methods: The Monkey Mind.

Meditation is an exceptionally great tool for controlling thoughts. In fact it is a highly important tool for inner emotional and spiritual development.

The monkey mind is a part of our consciousness that most of us dont pay attention to. It is also known as the subconscious mind, a state of awareness that sits between the awakened and sleep state or the concious and unconcious mind.

The subconcious monkey mind as it dubbed, is used to described the chaotic nature the mind has at deciphering the environment. This may seem a strange concept to some and perhaps a bit extreme to call the mind “chaotic”. However, in states of meditation the monkey mind can make its precence known when using methods to quieten in the mind.

In relaxed states , the monkey mind is far easier to experience as your concentration pulls from reality in to a state of conditioning. For example, close your eyes and try to focus on your own breathing for a minute or two. Do you find after a while your thoughts wander? That is your monkey mind fighting sgainst your own will to quieten as it slowly turns off from the world around.

Taming the monkey mind enables clearer thinking, thus meditation serves as a great way to develop a state of no thought, which resides in the sub-conciousness mind.

This feeling can be described as the point of falling asleep or awakening. However I find that ill defined.

Controlling the subconcious mind and making use out of it is what makes our minds special. For when in a state of calm and control we can use a place of no thought to introduce new thoughts or control one thought at a time.

Dealing with intrusive thoughts that are suspect of electronic harassment.

Dealing with intrusive thoughts can be difficult. In this respect we are talking about a symptom that is respectfully like borderline schizophrenia. The experience of voices or thoughts that feel alien to us.

It is a fact that all of us have a state of monkey mind which can run off at its own will. That can include voices and thoughts. This could be be simply recalling memories from the day or from the past. Therefore, they will include your perceptions and point of view of events.

In terms of Schizophrenia, the good news is that ALL of us hear voices or to put it another way, all of us can hear a voice in our heads when it comes to memory recall.

What can be worrying is when these voices are out of control. Certainly for some with Schizophrenia may describe their experiences differently especially when they maybe frightening to that person. However, the development of ones inner knowledge must also be understood to be that of darkness and light, good and bad. Therefore enlightenment is not always a happy experience

However, the use of meditation is a universal gift of humanity and can therefore allow us to control these thoughts if given the right knowledge to do so and also to control negative emotions.

If you want to know how important the sub-concious mind is to you then it is worth knowing that it is part of a persons awareness that is targeted by cults, organised religion and almost indisputably an area identified with mind control in organised harassment.

Identifying intrusive thoughts

In a controlled semi-concious state it is possible to hear neural triggering.

Having tested this numerous times it is clear to me that neural stimulation is actively having effect on the monkey mind.

What I have deduced is that the experiment is about pinging the brain for activity and then observing what it was that was pinged throught the use of cahrged particles in the air.

Therefore sometimes what you may hear or feel was the result of an electronic pulse aimmed at a specific part of the brain which has been stimulated.

You might be able to identify these thoughts, voices or sounds differently to the ones you hear around you. They will not be distinct or clear but can be random. That being that the voice or sound will not be a full sentence but more like short phrases.

Stimulating the brain only requires small electric charge but must be strong enough to penetrate bone and flesh. Alongside this, if the machine being used to conduct signals is behinf walls or some distance away then it will also have to penetrate walls and so on.The other thing we must consider is the size of neurons and nerves contained in the brain and how vastly complicated it would be to isolate specific ones when confined in a place with no apparent electronic machinery.

The other perception is that triggered thoughts are being created by the brain itself. That is that the monkey mind is constantly making sense of reality and therefore thoughts can be unhinged, this firing off neurons that hold a specific feeling or visual/audiable memory. However, this is something that can be produced by repetition and pattern. Certainly when it comes to computer applications the introduction of icons and patterned information in the simplest unassuming of forms can unfortunately be a programming you can not immediately detect without careful observation. In fact it could take a few years until you see daily patterns.

The human body holds a charge of that equivalent to that of 12v battery and therefore the directed electric charge required in the air must be of greater value to have an significant effect. If the monitoring is in realtime then there must also be equipment present in proximity to measure the electrical activity in the brain. This could be perceieved as a form of radar, xray scan etc but it could also be percieved as radio waves that most of our communication devices connect to such as wi-fi. Considering the nature of these technologies are able to penetrate thick walls then the ability to pass through the human body would present no real obstacle. It would mean that we would essentially sit in a form of ether that we can pass through being as the atomic structures in all matter including our selves are almost transparent on an atomic scale. To compare, a typical hydrogen atom comprised of one nucleus and electron are divded by a gap that on a real scale would be the equivalent to a few miles. If we were to compare this to the atomic structures contained in the bodies of living things then this makes us almost like a sponge that can absorb water. Therefore our bodies can pass through a network of waves or web of electrically charged air.

Wifi devices such as internet hubs and mobile phones both use this ether type of frequency transmission.

Scientific principle.

Because we are all studied to a broad extent the main flaw or gap in these systems is scientific boundaries. Also for the sake of scientific principle each person around a targeted person or subject must be divided. This is where ip addresses or identification number have been a consideration for people across the world. Alongside the concepts of microchipping and implants, the need for advanced surgury might be of no requirement. The web ether we pass through is already here.

This is not to say implants will not be used and that the claims of implants used on targeted individuals are a hoax. The fact that people know there is a problem and are talking abouy it openly means that we are not completely under control.

Gangstalking Techniques: Transport and Social manipulation.

Having looked at some of the coded methods used in psychological manipulation on transport, this blog looks at how it is incorporated into real-time operations,

How perps are able to reflect coincidence effectively in realtime.

The nature of how perps use the tactic of indirect language/sound on transport is a curious subject making its way into TI communities. It is also a looking glass into how effective this tech is and how it relates to mass mind manipulation.

Transport Gaslighting.

For a majority of the planned events, most are used in co ordination with street perps using street theatre. Transport used in operations generally tend to use fixed plates and certain advertising that is paid for by the government to be used in specific areas at certain times. Therefore this does not require complicated technology, only a presence.

Technologies used in Real-time.

One specific technology used on certain vehicles that exists isn’t to far removed from fiction. It is found in the film Goldfinger on the famous Aston Martin used by James Bond.

The DB9 uses a turn style number plate system which can interchange three different number plates within a barrel. Albeit a primitive design needing an extension to house the interchanger, it is not something we see on modern car designs.

The deceptive principles of this tech are not that difficult to achieve today considering the vast leaps in technology and it is likely to have been around for sometime when prototypes were being developed and tested. Certain perp issue plates are electronic display devices that can change to adapt to changing situations using the data file on the target. These plates are linked into an onboard computer that connects wirelessly to the mainframe computer. Naturally these plates cannot be changed on the roads in front of the public and normally have to be done out of sight using perps from outside the area.

Otherwise, local perps use a broad range of plates that are used for sensitization techniques. Generally they are non-specific. Examples of these are plates that incorporate 666, 999, 911, MI5, MI6 etc.

For more directed attention to the target the plates used can be changed if needed but if a target is a resident to one area these plates are not often changed but make up a series of aspects suited to the targets life.

A change of plate can sometimes be an issued order from perp controllers. A perp is either given money to buy a new car, ordered a new custom plate or is given a new car directly.

However as some targets know, the reflection of personal information can at times be too accurate to be possible using co-ordinated operations. Some of these events are planned well in advance and are practised on the roads before a target even goes near an area.

Therefore, electronic plates are sometimes used to fill the gaps. They will look exactly like standard plates, almost unidentifiable. They can be detached where some will be wireless and others with a small wire connection linking straight into the cars computer.

These vehicles will normally be introduced onto routes from quiet lay-bys, usually estimating the ETA of the target and adapting as necessary. In specific areas, perps need transport in numbers in order to subtlety manipulate traffic situations in order to get perps into position. This of course means controlling the speed of unassuming drivers. With the use of intelligence, civilians using predictable routes can also be shadowed to draw attention to plates and advertising if needed.

Civilians using registered plates sit on a database that is analysed in real-time on our roads using onboard mobile devices. If these devices are off or not present, then traffic cameras and satellite act as the eye to fill in what it can’t track.

How manipulative and accurate is this technology?

Staggering. Even to those unaware, traffic can be manipulated to very high efficiency around one or multiple targets. It can also control movement to isolate targets from those they know or bring them together if needed.

However this requires deep study of the targets actions, reactions and movements.

In terms of transport manipulation, this still categories under social manipulation where mobile devices can be used as prompts to control and time a multitude of individuals at any given time. This includes distancing Ti away from each other or introducing individuals that are subject to study.

Psychological control usually emanates from mobile devices depending on the nature of what the target is looking at during the day, through to the conversations they have. The subject matter or suggestion is usually a subconscious trigger where as previous events of the targets day to day lives are used as diversions or to other purpose.

Engineered coincidence.

Transport is also used by perps to highlight coincidence to targets whom are stationary, usually when at home. The “Newsfeed”, a function found in Facebook which generates random articles is one example of a linked process in the harassment program, as well as the functions in apps and programs.

If a target is to flick through their newsfeed, a series of co-ordinated events can be used to highlight sensitivity to specific articles. The program will select an article to show in the newsfeed while streaming downwards, one which has not been shown. A perp transport, normally one which is doing a circuit with others will travel past the house of the target. The program will then synchronize with the perp car computer to time its actions with sometimes distinct accuracy.

Sometimes perps need transport close to the targets address in order to arrive at the passing point in time.

Facebook is essentially the public view of the target against the information data harvested from search engines, advertised back at the user. This is exactly the same why community harassment works. It mimics the actions of internet social networking and data mining.

Organised Harassment: Transport

Update: I tweeted this post on the morning of 5/07/17


The morning of 5/7/17 I had decided to drive to a location I am familiar with. I has a small car park and is frequented by friendly types. The journey there was like any other I take. Plenty of perps and a vast variety of reflective tactics.

Considering the time frame, this was done in two hours since the post. These two car were not present on my arrival but were when returning. In the second picture the car was parked next to mine whilst the other was directly opposite.



Main Article

Road activity has increased since the arrival of smartphones as most have GPS technology, there are many reasons why a person could assume that being a driver today is harder than it used to be in some respects. True it is, but what is it actually like to be stalked on the road in real-time be it busy or quiet? How can a person notice the difference and how could it be possible to navigate or concentrate while all this happens?

The first thing I can say is that for the person who is not a TI, the frequency of this activity is not purely confined to harassments operatives, in fact they use human error as cover.

The frequency of traffic of millions of people can give a clear outline of peoples ability to deal with what is a stressful activity for many. That being that yes accidents happen but a majority of the time, traffic is able to flow each day without fail. That is millions and millions of people that are able to look after each others safety everyday.

This blog will include some insight to some highly sophisticated technology that is being used 24/7 and in real-time on targets and other people of interest at large. When you see it, it cannot be unseen, especially when a highly coordinated operation is in full swing.

You may have read about how targets can be sensitized to stimulus such as noise, colours, words, signs, in fact anything that the stalkers want you to be focused on.

On the roads drawing your attention to details is one aspect that is used often, therefore if you are a driver, stalking tactics used can be highly dangerous as many of them are designed to cause accidents. The operation is designed in such a way to avert blame away from the perpetrators but is also used to relay messages.

Car Licence Number Plates

Drivers in the western world have been able to use private number plates instead of the legal Reg plate that comes with their vehicle for many years now. It is a common thing and is often used for advertising.

Private plates allow a vehicle owner to customise a short message into their plate. It typically incorporates up to three words but the average is around two at most. The least that can be used is one letter and one word.

As legal requirement, a private plate is not allowed to spell out a word, it must incorporate number.

For example, if we were to make a plate with the sentence, “Word Up” then this plate would need to incorporate numbers such as Wor4 UP so that there is not a direct message applied to the plate.



A few years ago, the presenters of Top Gear caused international outrage during filming of an episode in Argentina.

The plate H982 FKL seen in the episode is code for HI (19)82 FKL(Falklands) and is what is considered to cause the most offence, as it is a reference to the Falklands War which Great Britain was involved in. The licence number H982 FKL is a legitimate British plate which dates to the late 80’s where the first letter of the licence number would change from year to year. From 1980 to the late 90’s this ranged from the letters A/B/C/D/E/F/G/H/J/K/L/M/N/P/R/S/T/U/V/W.

The second car with Plate N269 KNG or N(B)(F)(I) KNG is less obvious but references the following:

  • NB: To note the matter at hand

  • 69: A sexual position which involves simultaneous oral sex known in the Karma Sutra as Congress of the Crow. Perhaps ironic, the matter at hand involves no hands implicating the sexual position.

  • KNG: Normally short for King and can also apply to the last syllable of fuc(king) which in respect to the preceding numbers seems intentional.

In order, the message could imply “Take note of a hands free fucking”. This could reference the “Exocet” missiles Argentina fired at HMS Sheffield, sinking the ship

The third car EKH 646J presented a bit of difficultly to decipher but it seems to reference the number of Argentinian casualties 649 with the second car implying to invert the last 6 in (646).

Taken from Wiki, the expression:

Ekh (expression)

Ekh (Russian: Эх) is a spoken interjection in Russian and certain other Slavic languages. Ekh-ma (Эх-ма) is closely related.[1]

It is typically spoken by itself or at the beginning of a sentence, and can be used to express wonder, feeling sorry for something, reproach, pride at a just-accomplished feat, and other strong feelings.

“Эх, как важно развернулся! Фу ты, какая пышная фигура!” (“Ekh, how splendidly he’s getting on! Phew, what a magnificent figure!“) – Taras Bulba by Nikolai Gogol

In all, the message that seemed to be wanting to get across was that against 258 British deaths the Argentinians suffered far worse. The argument presented is that the plate H982 FKL was pure coincidence and that the presenters had no idea they were driving around with cars that were causing offence. It is well known that there has been history between the presenters and the BBC and it is probable that this was a tactic deployed to sabotage their careers. It is also debatable that the event was staged.

If one licence plate can cause such offence, imagine what an entire sequence can do to someone.

From experience, a car that was sold to me has reference to the government and a major world event. It was deliberate and the car was chosen for the purpose of sending a message. The way it is designed also made me question wither the car is used to relay the message to other targets should they have been sensitized to this system.

Further information

Coded Sentence Generator

This is a program used within a co-ordinated planning system that involves databases of many factors.

The whole idea is to attempt to relay a message across to a target without raising any suspicion in densely populated areas. This is the tactic used in organised harassment and it requires the use of data harvesting in real-time and a co-ordinated effort to relay information as soon as possible to the target.

This system is not confined to transport alone and incorporates many avenues which can find its way into the eyes of the target. If the message can be sent directly, frequently and where the target has no other option than to view the message, then this can act as part of the “coincidence” that targets experience when harassed.

If one is able to observe the operation as a whole and document it, one will notice patterns. Where operatives are used, consistences like a car which is use to relay a particular code can stand out. Therefore this is easier to evidence against that of e-mail and advertising which is being used as “coincidental” harassment,

An operative will be assigned one or a number of transports for use in harassment or maybe required to modify their current plates with private or issued plates. There are operatives in most areas of a country where cities tend to use different systems to those that are densely populated. It takes into account the way of life and the nature of the environments.

One of the most covered aspects of numerical and alphabetical coding is modern acronyms. Some targets report the frequent use of three numbered emergency codes such as 911, 999. In terms of intelligence, MI 5 is a commonly reported acronym incorporated into Reg Plates along with all number variants MI1, MI2 Etc.

In America (but not confined to), plates will include FBI, CIA and variants of PD, police departments. The list of Acronyms that can be used is endless simply because the harassment system can incorporate anything that it wishes to construct a “theme” around a target.

It does this through an artificial intelligence system that is already operative 24/7. It is much like a hive that is ordered but to create the “theme” specific members of the hive will be called upon “on demand.” This brings the un-ordered theme into an ordered sequence of events.

The AI system gathers enough intelligence on the target to pre-plan events. Considering how quick the system is, the plan is delivered by text message or though more sophisticated means where their is more participation required.

Particularly in street theatre, perpetrators many have to learn mannerisms, ways of dressing, coping the actions in videos or anything that is personal to the target.

This can be delivered by instructional video typically a cloud server that is access (read only) and will not be stored on the perpetrators phone for evidence purposes.

In respects to individual targeting, the events are always observed, studied and researched, looking at reactions, reaction times and other aspects of interest.



Information on Syndicates (Copied from “Information from COINTELPRO & the Truth About Organized Stalking & 21st Century Torture”)

This blog post is taken from COINTELPRO & the Truth About Organized Stalking & 21st Century Torture. It was the first time I have seen this article which was reposted on Twitter by a fellow TI yesterday. It dates from 2014.

From experience a majority of this is valuable information for targeted individuals and persons whom are concerned about organised harassment.

In this article there is a mention of a Supreme Council. I’d like to point out that this council is in fact the Freemason Organisation. In my targeting I have been approached three times about Freemasonry, one of which was more of an introduction. I also know that there are links to Freemasonry in my family.

Many thanks to the author of this article and I use this with full credit to the publisher. None of the article is edited by myself nor have I any involvement in its writing. The original article can be found at



“Confessions of a Gang Stalker” AKA Life in the Syndicate

“…I was eventually offered a place in the syndicate. The syndicate was presented to me as a kind of fraternity, a masonic-like mutual profit organization with strong police-like overtones. I was told that I was helping to build a better society. However, I have never been given any of the advancement opportunities I was promised. The “advancement system” of the syndicate is a slippery slope. They make you give up your security privileges, so eventually all of your communications are watched (which is why I composed this email offline where they can’t see me, and sent it via an internet cafe) and you have to attend meeting after meeting of mind-numbing pledges and chants. The premise is that if you sign contracts giving up personal liberties for the group, and you are genuinely innocent, then you will be promoted. I have only been promoted once, to the rank of manager, and I don’t feel as if it is a rewarding experience.Worse, you are never allowed to leave because they think you will give away secrets. Leaving is only permissible with a special contract that permits the syndicate to destroy your credibility (usually they make sure that the most attention any secrets that you reveal get is from crackpot UFO magazines, or diagnose you with schizophrenia).There are other problems. If you have children, you have to send them to education in syndicate owned schools. If you have a wife, you have to report on her, allow her to be spied upon, and be prepared to target her if they decide to turn her into a TI. The official “compensation” policy is that you will get to keep the children if she lodges a divorce. However, you won’t get to keep most of her material goods. They only want her to lose in the divorce proceedings so she gets nothing, not so the husband gets anything, so the syndicate takes it back as a tithe.

I suppose I should introduce the syndicate in a little more detail. I’m still not sure precisely what it is trying to do. [Blog Author note: It depends on the person selected and who initiated the campaign. In my case, CR is a Psychopath who likes to abuse women and this is the method he employs to do it. There are also different groups doing this that are not necessarily connected and whose motivations are different.] To everyday citizens, it presents itself as a group trying to monitor terrorists (or any other kind of flavor-of-the-month undesirables like gays/communists/witches) and drive them out. To other people, its a rotary club/chamber of commerce type operation. To others still, the most twisted conspiratorial minds, it is an organization that pulls the strings behind everything. To the puritan, it is a cleansing force. To the deviant, it is a gang of other deviants where everything is permissible. It’s the syndicate to everyone, though. I don’t know the extent of what it owns.

I do, however, know a great deal about the targeting process. When we get targets, we divide them into four categories: mercenary, practice, planning, and enemy. Mercenary targets are bought by outside parties. We advertise under a range of guises, from ads by “individuals” claiming to be able to kidnap people, to practical jokers. Some groups, like big corporations and some governments (the government of Xxxxxx pays us to keep some people busy, so do the Xxxxxxs when they have too many people protesting whaling) know fully well what sort of services we do, so we don’t really hide them. [Blog Author note: Certain unethical PI firms are actively involved. I know of two. One has become a national firm simply because they were rewarded by CR for participating in his campaign against me and the other is a large multinational firm where CR has very high level connections. He has also spawned another firm involved in  online “identity theft protection”. – Ironic (and suspicious) given his predilection for stealing and abusing  people’s identities.]

We get a lot of money from them, but we can still muster up a fair bit if worst comes to worst. I’m not sure so much about the NWO theory. Maybe the Xxxxxxx count, but you’d be surprised at how much money we can get from crime.  [Blog Author note: CR agrees. He was responsible for two major thefts netting him 1.3 million dollars each. One was an Art Theft and the other a Jewellery Theft (from close friends).] I don’t mean that we go out robbing people, but we can outsource money from biker gangs/skinheads/drug dealers pretty easily.[Blog Author note: And from Government Grants when one is connected as well as CR.] Our syndicate gets a lot of support from people in rough areas like Xxxxxx and Xxxx’s Xxxx. Because there are areas with a lot of people in genuine need, who would leap at the thought of fighting back at the criminals, we can always find allies to pressure the criminal portions of society. Of course, they are only pressuring them into giving us money, but it’s a pretty cozy arrangement. [Blog Author note: Sure it’s cozy. It’s called blackmail but what are the criminals going to do? Report it to the police?]

The second type of target is the practice target. We use them to train mobs. The targets don’t actually change, because we don’t want TOO many people fighting back at us. But we do rotate trainees between practice targets. This stops the person seeing the same people every time there’s a street show.

Then there are planning targets. These are selected by the syndicate for some reason or rather but aren’t paid for by mercenaries. You can usually tell the difference between planning and practice targets because they send people with experience after them. They’re still chosen by the same people though. The practice ones are of course chosen for their timidity. I don’t know how the planning ones are chosen.

Enemy targets are people that decide they’ve had enough and turn against us. Since they protest and try to foil our plans (which, considering that our jobs are already nervy, is a real pain in the arse), we try to really give them hell. The best way, of course, is through the psyche. My supervisor used to say that the Soviets had it right with Sluggishly Progressing Schizophrenia. [Blog Author note: CR figured this out in 1958 through his “friendly” (if that’s even possible) association with Dr. Ewan Cameron of MKUltra fame and his use of this strategy against his earlier victim Greta Goede, who I believe ended up an MKUltra victim.]

Some people up-top are proposing that we just kill them and have them declared Natural Causes or Accidental by the coroner. It isn’t likely to happen, though. [Blog Author note: CR has killed at least three people who got in his way. So some people at the top are in fact doing this. Of course, CR doesn’t hire “syndicates”. He is his own syndicate and has put together his own organization for this purpose. His targets are innocent women associated with controversial figures. In only one case has he violated this rule and in this case the woman was as guilty as the man – of course he’s not obsessing over the man…he’s too gutless to do that. And the people who were killed were mostly men who got in the way of his hate campaign against a woman he targeted. My guess is that he kills them when he loses control over them because he’s basically afraid of men.]

Anyway, I should introduce the main branches of the syndicate. Each branch recruits its own (everybody is a member of one of the branches) instead of people just joining a common pool. This keeps the work separate and stops people from finding stuff out that they shouldn’t.

My branch is the Scripting, Observation, and Execution Bureau (or “The Theater” as it is popularly known). By execution, I mean the execution of orders, not the other kind. We do the work that the majority of people with any knowledge of gang stalking will be familiar with: pestering and scripting minor incidents.

The Theater is actually divided into two sub-branches: Scripting Orchestration Officers (or “playwrights” as they call themselves) and Field Officers (or “thespians” as we call ourselves).

We have the most variety in our recruits. Popular sources are the police, the fire department, the zoo, and technicians of any kind. But we recruit from all places. Most members are neighborhood watch types (not official Neighborhood Watch, but “concerned people”). Ironically, we make sure that we do a lot of good, just to get some credibility. [Blog Author note: CR likes to “help” vulnerable people like abused women, women with cancer, mentally ill people, victimized minorities, etc. then recruit them for his hate campaigns. If a person is a key person (like a friend of the target) he will often victimize the person himself to “soften” them up, claim that the target did it and then use that to recruit them.]

Then there is the Bureau of Authority (“The Moneybags”). They don’t actually control the syndicate, but they have all the right jobs and connections. So, a judge might have control over the judicial process, but he will answer to a superior in the syndicate. Psychiatrists belong here too.

The Moneybags are so-called because they raise a lot of the money. It would be suspicious if big corporations funded groups like this, but they can invest money into front groups.  [Blog Author note: Like government funded “anti-hate” networks which they use to actually incite hate. CR set one up in 2007 in my community.] And the majority of the syndicate’s work is done through completely legitimate fronts. We can tap phone lines and access people’s records from behind government agencies.  [Blog Author note: CR has done this to me using high level corporate, government, police and intelligence connections.] Usually, these are the guys that go after Enemy Targets. Normally, harassment is organized under several “action policies”. If a target isn’t an enemy, a standard policy is enforced. Low level organizers (the aforementioned “playwrights”) play around with the target for a while and rotate crews. [Blog Author note: While the individuals change certain other things do not so it’s easy to identify these “crews”.]

When a target is an “enemy”, the policy doesn’t immediately change, but orders filter down from high-level organizers (usually the Supreme Council) which direct ‘Thespians’ to provoke the target or a similar action, and Moneybags to crack down on them once they get in the way of the system. This is called Mincing, because the thespians lure the “meat” (by making it complain or fight back) into the “mincer”. [Blog Author note: This is what CR is doing to me right now. I receive negligent medical care because he is paying people to tamper with my lab results. In some cases they indicate perfect results where I actually do have issues and in other cases where I don’t have issues I’m getting positive results. See my comments on the mammogram issues. There is no lump in breast and  a birth mark appeared where mammogram detected something. The Doctor is aware of this and yet continues to force the issue by insisting on ridiculously frequent testing on this, despite the visible birth mark. I complain about this and refuse to act on the positive results but want action on the negative results (which I have actually proven concretely are wrong. See my comments on my blood sugar). The Doctor is told that I’m complaining , the complaints are exaggerated and law suits are mentioned. This is intended to and does make the Doctor get defensive. The Doctor is encouraged to attribute this to my medical issues all “being in my head”. The next step will be the Doctor fabricating some reason to involve a psychiatrist.]

The Bureau also protects members of the syndicate. Normally, in a court case/psych examination or similar situation where a syndicate member is at the mercy of a moneybag, a special order arrives from above telling the moneybag to take it easy on the guy and let him off scott free. The order is always printed in blue, on fancy cherry-blossom paper, but in a very official border/font. [Blog Author note: I know of several cases where the person was caught doing something illegal (the intent being to frame me) and in all cases,  with the exception of one, neither the news media reported nor was any action taken. This one case was not done in the commission of a frame up against me, but it involved one of CRs paid skanks. The news media picked it up, and the person was not charged under the most bizarre justification imaginable. He committed a hit and run killing the person. There was suspicion that he was drunk but since he had left the scene this couldn’t be proven. His story was that road was slippery and he couldn’t stop. There was no evidence that he even tried to stop. He was not charged on the grounds that he was a new immigrant (Filipino) and he wasn’t used to driving in the snow. Frankly I have never heard of anything so ridiculous.]

“Cherrying” is the name for this secret process. The Bureau of Authority has a very organized system of lawyers, judges, medical officers, etc. Whenever you’re committing a crime for the good of the syndicate, you must always report your location. Then they send Cousin Nancy (this is an affectionate term for the police in the employment of the syndicate that they send to arrest you instead of non- syndicate cops, so you can go straight through the appropriate channels without anything suspicious being seen) to tail you and “arrest” you the moment somebody calls 911.

They all follow a minimalist strategy though. For example, the mayor of Xxxxx isn’t a member of the syndicate. But several of his advisors and aides are. This way we can get laws passed in a discreet manner, and if a high-profile figure is targeted, our hold on an organization doesn’t loosen. We try to arrange elections of mayors that aren’t too headstrong. Though the government is mainly used as a minor nuisance. We prefer the courts for most activities. [Blog Author note: The past Mayoralty race in Toronto was an example of this in action. Except that CR wanted a candidate he could  control directly. The media golden boy in that race was that candidate. Thank goodness, he lost.]

The Bureau of Technology (Field), BoT(F) is the group in charge of the electrical equipment. They work alongside us thespians and “gaffer” the targets by giving them the usual fatigue/headaches/medical problems. They can also destroy equipment, screw up televisions, the works. I think they are particularly sadistic.

Different crews use different Techs, but they’re all unpleasant. The incapacitators come in a lot of different forms. There are ones that come as a lightbulb that slowly gives people eye-strain and makes them tired. You can fit some in computer/TV monitors and the glare irritates people.

I’ve heard they’re even building fridge magnets with electronic devices in them. That isn’t the extent of the BoT(F)’s machinery.

They manufacture pills that can cause deformities in the womb, as well as miscarriage and give them to women in their food. They can fake HIV/AIDS so the test shows up positive the first time, but subsequent tests show that it was a false positive. This faux-HIV can be put in the target’s food. They usually give the target a few health scares, but they don’t like to physically hurt anyone. [Blog author note: Not true in the case of CR but then we know he’s more extreme than your average since he’s a sexually sadistic Psychopath. His intent is to create real health problems and ensure they aren’t looked after. or misdiagnosed health problems where the treatment itself will damage the health of a healthy person. See my comments on my mammogram fiasco and recent rumors that my other health problems “are in my head” (an excuse to justify involving a shrink). CR has recently funded an Alzheimer’s clinic and has made a new contact, a well-known psychiatrist, who specialized in the mental health of older adults. (I’m in my 50s). He’s also been spreading ugly rumors about me to dentists (and I suspect offering bribes and favors). As a result every dentist I’ve gone to has done serious damage to my teeth to the point where my face is changing and my bite is so messed up now that I can’t eat without biting my lips or the inside of my mouth. In some cases (most) these dentists have engaged in deliberate fraud which has been covered up by the Dental Insurance company which has another paid skank of CR’s on the BOD, Lorna M. The last dentist deliberately drilled too deep to force a root canal which I would have had to pay for. Previously  my co-workers were setting the stage that the coverage only covered “certain types of root canals”. Of course this is a fabrication which would have been backed by the Insurance Company simply to ensure that I had to pay out of pocket. Since CR has wiped me out financially and uses his connections to violate my privacy by accessing my bank and other financial records through various illegal means, he’s well aware that I can’t afford this and as a result the work won’t get done and my teeth will deteriorate further.]

One Field Tech I knew had a penchant for giving people Syphillis. They could treat it easily enough with penicillin (and the syndicate always made sure that it would be diagnosed on time), but it showed up on the targets’ permanent records for medical treatment. They also conduct extensive testing without the target’s knowledge. [Blog Author note: I believe this was done to me when I contracted Trichomoniasis a couple of years ago, which I also believe was improperly treated by the Doctor I was seeing at the time. I believe she is one of CRs paid skanks and related to a Sikh terrorist who claimed to be a CSIS informant but conveniently never gave CSIS any useful information that would have resulted in the conviction of the Air India terrorists. (another of CRs paid skanks). I also believe the person who transmitted it to me did so unknowingly and was deliberately infected by someone else. The Doctor felt it necessary to report this (not normally done because it’s so common) and improper treatment can result in the Protozoa going into one’s organs (liver and kidney) and damaging them permanently. Since I’m a kidney donor and only have one kidney this is particularly pernicious assault on me by CR amongst many other assaults intended to do damage to and weaken my single remaining kidney. Something in the drug treatment I was provided also resulted in my face swelling and hooded eyelids.]

One TI we were monitoring was found to have a malignant tumor in his head (not our doing). He wasn’t experiencing any of the symptoms, so we gave him some through the incapacitators and had a few of his friends warn him about cancer. He had a test done, and just for fun, we had the doctor tell him how dangerous it could be and how he could die soon. We gave him a six month waiting period and told him that by then the tumor could progress so far that it could never be removed. That’s a lie, of course. Our BoT(F) had it out in a jiffy by sending one of their brain surgeons to do the job, but it’s the fear that counts. [Blog Author note: CR would have gone further and had the Brain Surgeon do deliberate damage. Enough to cause problems but not enough to put the person out of commission. This is the difference between how a Psychopath and a non-Psychopath function.]

The Bureau of Technology (Communications) monitors the target’s phone calls, emails, and absolutely everything else. They tend to recruit from the national archives, census takers office, records office, credit card companies, medicare, insurance, etc. They are the logistics branch. As I said, most of the syndicate’s work is done from within legitimate areas.

What the BoT(C) does (very often) is send a “receptionist applicant” over to a credit card company or government agency pretending she knows nothing about hacking computers or accessing records. We pull a few strings and she’s in. She then steals information while nobody is looking. A few old-timers like to have 100% control over the “records farm” but most prefer the minimalist approach. This is the bureau that gives out information and orders to everybody else, and also acts as a communications post for the whole syndicate.

The Supreme Council delivers orders through them. Outside orders are also taken in through the BoT(C), which advertises as a mercenary group through certain channels.

The Bureau of Alliances, or “trading partners” handles our allies. As far as I know, the syndicate is Xxxxxxan only. The only other gang stalking group in this country is a West Xxxxxxxxan organization called the confederacy. Very often they try to move into the xxxxx xxxxx so we have to hold them back, diplomatically or otherwise. However, we have contracts with Xxxxxxan groups whereby we handle their targets when they move into Xxxxxx. The same with the Xxxxan groups and the confederacy. The other groups pay for their targets to be “handled” while they travel here. We make millions of dollars this way.

Finally, the Supreme Council controls the entire operation. I have no idea who they are, except that they have a fancy name instead of being a Bureau. They do not recruit their own men. They promote from the other departments.

Most of them seem to be wealthy individuals with inheritances that manage to maintain their fortunes from investments. Not one is a CEO, Judge, or Politician. They are all just old money family types that live in the Xxxxxx Xxxxx and seem unusually lucky with their money (no doubt through insider trading).

Despite this, they have a lot of spiffy technology. They have a kind of reverse incapacitator that improves their health and increases their performance. Most of them look incredibly young for their age. We don’t see them much, though. Often, an audience with one of them is a kind of reward for good service.

There are also ranks in our syndicate. The lowest members are pawns. They’re not technically members, because there’s no permanent service contract and they don’t know they’re working for us. They take orders from us but they’re not expected to attend meetings. We call our pawns “concerned citizens”, the Authority bureau has “office boys” or “secretaries”, the BoT(F) has “lab rats” (who very often are paid volunteers for experiments, or people who don’t know what they’re testing), the BoT(C) has “spelunkers”, the BoA has “travel agents”.

Unfortunately, we’re not obligated to give protection to any of these people. So, we can give a vet an order to put down a dog, without telling him that it isn’t consented to by the owner, and he will do the job and get sued without us giving him legal protection. A lot of our street theater is done by people that don’t even know they’re part of a syndicate. They think they’re a grass roots movement and don’t know that there are other people harassing the target.

The BoT(C) recruits people that think they’re joining the hacker groups on the internet, or people that think that they’re just following orders from the archives. The BoT(F) does 80% of its research at legitimate agencies like Xxxxxx’s XXXXX and its drug companies. The task of pawns is to think that what they’re doing is either normal and routine, or criminal in an individual isolated manner.

Recruits, however, are aware of a conspiracy. However, they still remain at a misinformed level. We simultaneously maintain teams of “religious” actors and “punk” actors. A person might join us thinking he’s going to clean up the community. Another person might join us thinking he’s going to cause trouble and anarchy. And they can go about their merry ways.

We even deliver information to them in different ways. To the religious ones, it’s wrapped up in prophecy and revelation. To the punks, it’s given a communist candy coating. However, they’re all aware that the group is large.

They’re also aware of a mutual benefit aspect to the operation. Only greedy unidealistic people get beyond the recruit rank.

All the Bureaus wrap themselves up in different colors. The Moneybags pretend to be a secret club for the elite (and many of them are indeed quite powerful and wealthy, second only to the Supreme Council). The BoT(F) claims to be a “humane” research agency, or a means by which scientists can resist corporate greed, though it still attracts deviants. The BoT(C) is conspiratorial minded, and pretends to be a group searching for the ‘secrets of the Illuminati’ or the Illuminati themselves. The BoA claims to be a contract agency, traveler’s club, or accounting firm.

Recruits perform tasks that they know are illegal, or immoral, but they still generally believe that they’re doing it for a reason.

Managers like me come above the recruits and do some actual organization, whether leading a crew to a street theater match or planning an attack. Generally, managers know everything about the syndicate except what its goal is. Most are greedy enough to accept that it isn’t a morally motivated group. We also engage in communication with other Bureaus to co-ordinate our activities.

Different terms are used for different MOs.

The Theater has “Playwrights” and “Leading Roles”. The moneybags have “Success Stories”. The BoT(F) has “Research Directors”. The BoT(C) has “Information Awareness Officers”. The BoA has “Arrangers”.

Finally, a rare few are promoted to the Supreme Council.

GLOSSARY OF TERMS (both colloquial and official):

Contract: A TI or Target. This is the official term. Used as “Enemy Contract” or “Planning Contract”. Enemy contract is often referred to as “hostile contract”.

CHERRYING: Getting out of a legal tangle through the syndicate’s intervention.

NIPPLE-KISSER: a ‘deviant’ recruit, recruited because of a desire for sadism.

HOLY POLY: a ‘religious’ puritan recruit.

THE EFFECT: the fact that greedy and sadistic recruits are selected for managing jobs more readily than anybody with integrity.

FBG (fertile breeding ground): a crew of nipple-kissers, based on the idea that they are a fertile breeding ground for future managers.

MINCING: Luring a target into the legal system.

DEFACING: making faces at a contract, or otherwise intimidating them.

XXXXXX XXXXX SYNDROME: having a target so socially unpredictable and badly-off that you can’t really think of many ways to make their life much worse.

RAINBOW SHOCK: the fact that you have to act nice to the rest of the public immediately after you’ve stopped defacing a contract.

BREAK-A-LEG JOB: a particularly hostile attack against a contract, or a plan which involves approaching the target and talking to them.

SAKURAKAI: a crew that is particularly overt in its stalking and gets caught too often. In other words, it has to be cherried all the time.

CREW: A unit of recruits and pawns under a single MO. In other words, a group of gang stalkers.

ZAPPERATING: using electronic devices to affect the health of a target.

XXXXXXX XXXXX: rhyming slang. for big mistake, roughly means “we shouldn’t have used this method”.

UNCHAINED, UNCOVERED: authorities that are not pawns or recruits.

COVERED: A member of the public that is under the control of the syndicate (as a pawn).

PUBLIC FACE: A recruit or manager’s official life outside of the syndicate.

PRIVATE LIFE: a syndicate member’s activities with the syndicate.

INCAPACITATOR: a device that affects the sleeping patterns/stress/fatigue/headaches of a contract.

VOODOO: the means of acting hostile to a target (pointing, staring, etc).

LOMOSEXUAL: a syndicate member with a knack for photography. (“There’s a lomo in every crew!”)

NYUNKIA: (Not Your Usual Nipple-Kissing Incapacitator Asshole), the “yu” is pronounced as the “oo” in ‘moon’. refers to a particularly sadistic or deviant BoT(F) member.

BONER: another word for an enemy target.

YELLOW MEAT: criminals, as opposed to “concerned citizens”. refers to criminals recruited into the syndicate.

XXXXXXXX (verb): to Xxxxxx somebody is to run them over or chase them with a car.

GIGOLO-BOP: to make sexual advances to an unattractive target, term mainly used by “nipple kisser” deviants.

CANCELLING: causing a miscarriage.

CRASH TEST DUMMY: a practice target.

HANG-JOB: the experience of having a target that one has enjoyed tormenting suddenly commit suicide. Term used mainly by nipple kissers/nyunkias.

COUSIN NANCY: a police unit sent to tail a crew and arrest them before an unchained police unit can do it.

XXXXXX NECKTIE: a death threat made with no intention of it being carried out.

GENERAL LEEING: randomly chasing after a target and threatening to rape them before immediately running away.

XXXX’S LAW: a police department that is thoroughly under the syndicate’s control.




DEJA VOOOO: doing the same skit over and over again.

Wild Goose Chase: Perpatrator tactics and (GS) Google Services


This is information relating to how harassment operative working in the community and on the internet are using methods to take targets attentions off of mobile and satellite technologies.

I have observed TI testimonies on the internet for some time and a majority of them are looking for the sources of electronic weapons that are active in their areas. Most often than not, most TIs who begin to experience harassment especially when they feel the source of it is happening in their own homes begin to suspect that it is due to hidden cameras located in their property.

If you have a mobile device then it goes without saying that the number one source of leaked information is coming from that device.

Of course, most TIs become aware of this and find ways around it. I often recommend to TIs using smart phones that they use black tape to cover all lenses and eye recognition (the source of face detection software to read emotions) if they can deal with a phone that might operate a bit slower.

However, many will notice that this is not enough to prevent harassment. For this I advise reading my blog post on the subject of radar-r which is about wall penetrative radar which is able to see through the walls on properties to spy, regardless if your smart devices are on or not.

I recently watched a video where a target was advised to check for an inanimate object located on their property where it was suggested that it was the source to v2k harassment. It appeared from the persons point of view when the object was dealt with that the v2k harassment stopped.

Unfortunately, this is a just a wild goose chase that operatives use to feed false information and ultimately use to waste the targets time. It is likely that any harassment will stop once the person has taken the bate so to influence a state of relief. From that point onwards harassment will work on a different area ultimately taking the attention off the true source. This in eccence is the true nature of mind control and the current devices used today are playing a major part in it. Most TIs are looking for something that is starring them right in the face. Especially when a target records a video directly onto you tube via their mobile phone, the situation is quite an unsettling one.

TIs know that turning off their mobiles are not enough. Even if your property is in a confined area, there is something that everyone and not just TIs should be aware of.  Only last year it was announced that Facebook were trialling a satellite technology much like google already use. Satellite imaging used today is advanced enough to work in conjunction with the technology you use to co-ordinate operations down to small scale situations.

Therefore be careful of whom you get your advice from. So far I have received an number of messages from some individuals claiming to be targets where they are in fact just routing for information. Considering the scale of this operation it is highly likely there are major attempts currently underway to deal with the rise of TI testimonies. One notable thing to look out for is those with apparent “credentials”. We are likely to see more “Undercover Operatives” claiming to be from certain areas of society whom are wanting to dis-solve this situation. They will feed a lot of dis-information whilst also bringing about a lot of real information. However, it is still at a time where the balance is very complex because the act in itself is a huge war crime which pre-dates any current laws that have been brought in.

Smart phone cameras and Global Mapping

People may not realise this but practically every single property or area on the planet where a smart phone has been present will have been mapped its surroundings and will have been logged onto a computer server. Especially if the owners or previous owners were perps then they will have been required to map it out completely including areas that are not accessible.

Every time you use a device, snap shots will be taken everywhere you go. Therefore objects, people literally anything around you can be accounted for.

Recently the new Samsung mobile phone Galaxy S8 was announced around a few months ago incorporates new AI software which will take technology to new levels.

The public may think that this technology will be useful for being able to detect and record things in their surroundings which can then automatically find these items on the internet but the purpose isn’t just for public convenience.

Much like its always been, this is a way that the public will unwittingly be opening the door to more detailed observations of their own surroundings to be data harvested. A majority of the current harvested data is enormous but these devices might operate more in real-time to track, log and predict events.

GS: Google Services

Many do not realise just how big a company Google is and just how powerful the artificial intelligence is having influence on us all.

It is not clear as to where or when the term Gang stalking came from but it is now clear that it is was likely a coined term used to mislead everyone away from the source of the main operation at play. That was to make people assume that any technological harassment would be coming from organised cyber-gangs/criminals with the intent to take the public’s attention off of the major co-operations which have ultimately controlled those situations from the start.

Most perpetrators work for Google, the rest can work in-between other major internet companies and can be paid handsomely. It is these kinds of salaries that make working for these companies almost unavoidable especially if the person has financial problems.

It is also another reason why TIs who are targeted can become perpetrators. Some TIs become pushed towards financial ruin and therefore end up taking the salary over becoming homeless.

Why TIs are valuable to GS.

This is probably obvious to many because TIs are at the forefront of all operatives active at the same time. This means that TIs can see the grand operations in more detail. They can also observe that these individuals are separated off in many ways wither it be through contracts (do not talk about what you do to anyone) or social conditions. Operatives do not realise that this technology is used on them also and it is highly likely that these people are the most brainwashed of them all.

If TIs can be turned then it will be of enormous benefit because if anything despite being isolated to whatever degree, the main aspects of separation are purely psychological. Within the organisations there are legal contracts which then make the situation worse because this makes the likelihood of prosecution greater. Therefore most operative have no other choice than to go down the route of whistle-blowing.

The most prime example we know of is Edward Snowden. As most TIs know, Edward Snowden has revealed a lot of information about the NSA. Considering the nature of surveillance, there has been no mention of the phenomena of “gangstalking” or “Company/Government funded harassment” a la Stasi/Zersetzung style tactics. This is a bizarre situation which has many wondering if he is in fact a person who has been assigned as a propaganda operative.