Satellite Harassment

Space is a strategic resource. If you can control the space, you always are a step ahead of your opponent. Satellites were initially launched in the late 1950’s. The cold war era, with constant threat and Soviets secrecy, propelled the US military to build spy satellites to take pictures of the USSR and map the Soviets capability. The CIA launched a Corona project from 1959 to 1972, wherein reconnaissance (informally spy) satellites were used for photographic surveillance of the Soviet Union. Today, the satellites capability has increased ten-fold with the advancement in technology. A high-throughput satellite (HTS) has more than 100 Gbits/second of capacity. Also, a satellite can zoom into less than 20 cm^2 area on the earths’ surface.

Spy satellites are mainly in the lower-earth-orbit (LEO). The LEO stretches between 160-2000 kilometers. As per the inverse-square law (law of satellite communication systems), the smaller the distance, the easier it is to communicate. Secondarily, it is also easier to observe. Considering Snowden leaks and the recent Vault-7, there is little argument that the US government is spying around the globe and collecting any information they can get hold on. Between, did you know that the most valuable military weapon is information?

Information can be effectively used to manipulate, subjugate and falsely frame a person. With GPS, satellites can be used to track and even harass a human. Yet, the most dangerous use of satellites would be harnessing electromagnetic weapons. Directed energy weapon (DEW) is a form of electromagnetic weapon that emits highly focused energy to damage the target it is directed at. Potential applications of this technology include to disable anti-personnel weapon systems, missile defense system, vehicles (cars, drones, watercraft) and electronic devices (mobile phones, tablets). The same can be used lethally against humans as well, similar to the concept of death ray shown in Star Wars. A non-lethal version of the electromagnetic-weaponry, known as the Active Denial System (ADS), focuses directed energy to heat up a part of the body and cause pain to the area it is pointed at. ADS works on the same principle as a microwave oven, exciting the water and fat molecules in the skin, and instantly heating them via dielectric heating. Moreover, other means to repress a target non-lethally would be to bombard him with microwaves/radio-waves using satellites which causes headaches, skin irritation, dryness, poor concentration, poor body balance, disrupts cognitive processes, etc.

There was a bill passed in 2001 by Dennis Kucinich in US to ban space weapons. You can find it here: US Bill to Ban Space Weapons

The UN General Assembly has passed resolutions each year for the past 22 years calling all states to refrain from actions contrary to the peaceful use of outer space and for the prevention of an arms race in space. The resolution requests for a negotiation in the Conference on Disarmament. Most of these resolutions have been unanimous and without opposition, although the United States and a few other governments have repeatedly abstained.

There are thousands of victims popping round the globe claiming to be tracked, scrutinized, tortured and terrorized by satellites using electromagnetic (also called psychotronic) weapons. The interesting trend noticeable here is the surge in the number of victims which remarkably coincides with the increase in number of satellites in space post-2000. The victims call themselves Targeted Individuals (TI). TI’s claim to live under constant surveillance and their lives are disrupted in ways nobody comprehends. Most TIs’ are unable to work, face vandalism of property and tampering of work, computers, mobile with hard-to-detect remote administration tools (RAT). The law enforcement denies the illegal use of such weapons. The physical inflictions are easily discredited by Psychiatric institutions as somatoform disorders or reasoning delusions. The thing about this covert technology (electromagnetic weapons) is – it is completely invisible, with little public awareness. Most people still believe, the weaponry today is just a bit more advanced versions of the ones used in World War 2.

SatelliteHarssment

Remote Neural Monitoring (RNM)

Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object via a satellite, aircraft, radar or other device. Our eyes and ears are a form of remote sensing and they work pretty well for a specific electromagnetic spectrum range. Remote sensing uses radiometer or LIDAR technology to study glaciology, oceanography, hydrology, ecology, climatology etc. In forestry, the data collected from remote sensing is processed via an imaging spectrometer to measure the chemical composition of plants. Remote sensing is also applied in astronomy as stars and hot celestial objects radiate electromagnetic radiation. Spectroscopy, helped us get an idea that the sun is made up of hydrogen before the 19th century, which was confirmed in 20th century using a Super-Kamiokande (Super-K) detector.

Can the same remote sensing be used to pick up brain signals emitted by humans? Our brain works on bio-electricity and emits very low range radiation (1 Hz-100 Hz depending on the brain state). Everything that works on electricity is hackable. How would a brain hack look like?

Brain controls every function of the body, it is your CPU. In a hacked brain you can make a person feel anything, induce thoughts, psychosis, depression, voices (synthetic telepathy), involuntary motor movements, read thoughts, etc. A total mind-control! Current research in neuroscience, seems to make some progress on decoding the brain activities. However, in the present day a hacked brain seems too sci-fi and far-fetched.

Astonishingly, it is claimed by TI’s that brain has been decoded and their activities are constantly monitored by satellites using Remote Neural Monitoring (RNM), an advanced form of remote sensing. The RNM technology is highly sophisticated and 50 years ahead, kept classified as it is the ultimate weapon. Every human has his own unique bio-electric resonance, just as the unique finger-prints. The bio-electric resonance frequency can be picked up by satellites and with advanced digital signal processing techniques, a human brain can be remotely monitored and its activities tracked.

Targeted Individuals often complain of synthetic telepathy. Synthetic telepathy is commonly known in the targeting world as voice-to-skull (V2k). You can buy one of your own device at Audio Spotlight Directional Sound System by HolosonicsThe product is named the Audio Spotlight. It sends a signal at 65 kHz, with a small wavelength. The short wavelength prevents the dispersion of sound. However, human hear sounds between 20 Hz to 20 kHz. The spotlight leverages a property of sound, wherein two sound waves interfering at high frequency create sound, thus modulating the wave in air. The narrow targeted beam is only heard by the person to which it is directed at. Additionally, another US non-lethal DEW weapon, MEDUSA (Mob Excess Deterrent Using Silent Audio) exploits the microwave audio effect to create sounds by stimulating the auditory cortex. When MEDUSA is fired, a beam of microwaves is turned into sound with the interaction with the human head. Nobody else can hear the sound unless they are in the beam space. MEDUSA is devised for crowd-control and can be deployed via satellite.

Most TI’s initial targeting involves synthetic telepathy and psychosis. This drives the target crazy and effectively discredits them. Once a person is proved insane, you can remotely do anything with the person, and nobody buys it. Medical field has achieved some impressive feats and has a good literature on the possible causes of diseases and aberrations. Numerous times, there is no litmus test to identify which cause among the listed ones would have led to the disorder/disease. Also if medical practitioners don’t understand the cause, they conveniently shift the blame to genetics or stress. Somehow, surprisingly, technology as a cause for disorders/diseases is never accounted for. It could be due to medical technical-incompetence, information control, cognitive dissonance or plain close-minded hypocrisy.

Anyways, with capabilities of RNM, the state of surveillance today is way beyond anybody’s imagination. George Orwell would feel minuscule at the extent of surveillance and the might of Big Brother in the present-day. Some bold TI’s have approached the US Bio-ethics Commission and given their testimonies. Other TI’s have written numerous letters to human-right NGO’s, politicians and media-spokesman. The Bio-Ethics Commission side-lined TI claims saying that we do not deal with such issues, while others paid no heed to TI’s desperate cries for an investigation. TI’s have taken to internet to detail the misuse of this covert technology, their daily harassment and to create public awareness.

While the world seems to mock and ridicule the TI’s as a tin-foil hat joke, their lives see no end to this nightmare. Shifting locations doesn’t help as satellites cover the entire planet. The only hope in this parallel running system is a leak, confirming its existence. Quite assuredly, the parallel system should have got more vigilant and secured by now, as the potential irreparable damage to the nations’ governments if it blows up. Probably, a solar flare or coronal mass ejection (CME) from the sun inducing a geo-magnetic storm could destroy the workings of satellites providing temporary relief from this selective dystopia for a few.

 

Organised Gangstalking Today

“Organized Stalking is a form of terrorism used against an individual in a malicious attempt to reduce the quality of a person’s life so they will: have a nervous break-down, become incarcerated, institutionalized, experience constant mental, emotional, or physical pain, become homeless, and/or commit suicide. This is done using well-orchestrated accusations, lies, rumors, bogus investigations, setups, framings, intimidation, overt or covert threats, vandalism, thefts, sabotage, torture, humiliation, emotional terror and general harassment. It is a “ganging up” by members of the community who follow an organizer and participate in a systematic “terrorizing” of an individual.

To give a bit of background, the origination of Organised Gangstalking traces back to Zersetzung (used by Nazi Germany and later Stasi) and COINTELPRO (Used by US in 1956). Zersetzung is a psychological warfare technique devised to silence dissidents by repression using personal information, ingenious tactics and an access to a variety of institutions. Zersetzung involves a number of psychological manipulation techniques to disrupt the targets life. If you get into the details of Zersetzung, it was an immensely clever, subtle form of psychological harassment, where victims themselves were unable to figure that the Stasi was responsible for their victimization. Infact, it was so elusive that its very existence was plausibly denied. Many victims thought they were losing their minds, had mental breakdowns and some committed suicide.

 

Untitled

 

Stasi has been described as one of the most effective, repressive intelligence and secret police agencies to have ever existed. You can find the details here of the history of Organized Gangstalking .

 

Understanding Organized Gangstalking in the Present Day Scenario

Organized Gangstalking today goes beyond Zersetzung, though many of its techniques are still used by the perpetrators of the crime. OG along with Zerstezung employs current psychological research and technology to terrorize a victim. OG is an extremely sophisticated program and an effective form of mind control. The Organized Gangstalking leverages the way the mind works to make an efficient use of resources, discredit the victim and destabilize them.

To understand Organised Gangstalking in the current-day, you need to understand the psychology of fear and some psychological terms: Conditioning (associative learning) and sensitization (non-associative learning)

Mind on Fear

neurons-

In terms of neurology, fear is the best understood of all emotions. It is an innate emotion, that triggers easily. The almond-shaped amygdala is considered to be the seat of fear in the brain. When a mind is subject to fear it shifts into fight and flight mode.

Humans share five basic fears:

90953-144235

OG mainly taps on loss of autonomy and ego death. Loss of autonomy is the fear of being restricted, entrapped, imprisoned, smothered, or otherwise controlled by circumstances beyond our control. While, Ego death is the fear of humiliation, embarrassment or any other mechanism that is of profound self-disapproval and threatens the loss of integrity of the Self.

A frightening stimulus, triggers certain psychological responses such as sweating, faster heart beat, shortness of breath, etc. Fear can be invoked just by observation and thus we feel scared during and after scary movies. The interesting part is, fear can trigger emotions and fears unconsciously—without the mind even realizing it. For example: You are at a coffee shop and the waitor taking the order is rude to you. He is wearing a blue-checkered apron. The next day when you see somebody coming down the street and think, “I have this gut feeling about this guy, he’s involved in my harrasment and I don’t like him”. Probably, the guy is also wearing a blue-checkered tie. Consciously, you would be saying I have a gut feeling because I don’t like the way he looks. However, what has happened is that the necktie has triggered the activation of the amygdala through the thalamus. Consequently, the activation has triggered a fear response, which you are consciously interpreting as this gut feeling about not liking the guy. In reality, it is triggered by external stimuli that you are not processing consciously.

The unconscious processing of frightening stimuli happens much more quickly than our conscious processing of it. To become consciously aware of a particular stimulus takes 250-300 milliseconds, while a fear-evoking stimulus can reach the amygdala in a mere 12 milliseconds, which is evolutionarily advantageous if one’s response time means the difference between life and death.

Thus, the fear emotion is a necessity and important for adaptation, survival. However, the downside is, if a human brain is subject to constant fear it can hamper the working memory and reduce the neural feedback. Sustained worry and fear would change the brain architecture, as well as the impulse control. Fear can interrupt processes in our brains that allow us to regulate emotions, read non-verbal cues and other information presented to us. Consequently, in a whole, it impacts the thinking and decision-making in negative ways, affecting the interpretation of events. It will also leave the human brain more susceptible to intense emotions and impulsive reactions. All of these effects would leave a person unable to act appropriately.

Moreover, constant subject to fear produces immense cortisol, the stress hormone. The long term effects of being subject to fear is chronic stress, free-floating anxiety, worry, daily insecurity, weakened immune system, gastrointestinal problems such as ulcers, irritable bowl syndrome, adverse mental health, etc.

Classical Conditioning  Also called Pavlovian conditioning, is a core method of understanding biological behavior in psychology. Classical conditioning, an associative learning technique, is widely used in advertising to pair products with a certain behavioral response, and to create brand appeals. It is a method, in which a mind is conditioned to a learning procedure wherein a stimulus (eg: burger) is paired with a previously neutral stimulus (eg: McDonalds logo). The pairing would elicit a response (eg: salivation, hunger). Conditioning uses the conditional reflex phenomenon. During the conditioning procedure, responses to certain stimuli are acquired where no responses existed previously.

It is worth noting that much of the classical conditioning is mediated unconsciously, beneath the horizon of our conscious awareness. The circuits in the brain that are responsible for classical conditioning, are not associated with cognitive evaluation and are different from those responsible for our episodic, autobiographical memories, memories that at times, can be experienced consciously. Unlike other forms of conditioning, the conditioned response in classical conditioning (e.g., the cravings one experience when looking at a beautiful cake) cannot be suppressed at will; they are ‘involuntary.’ One can suppress behaviors but not the urges associated with them.

Fear conditioning leads humans to learn to predict aversive events. It is a form of learning in which an aversive stimulus (e.g. an electrical shock) is associated with a particular neutral context (e.g., a room) or neutral stimulus (e.g., loud noise), resulting in the expression of fear responses to the originally neutral stimulus or context. Eventually, the neutral stimulus alone can elicit the state of fear.

Sensitization – Sensitization refers to a non-associative learning process, in which repeated exposure to a stimulus results in the progressive amplification (increasing strength) of the reaction to the stimulus. The brain becomes more sensitive to the stimulus as time progresses. For instance, a child who is bullied at school, initially wouldn’t bother much. However, as time goes on and the stimulus (bullying) is re-experienced repeatedly, the child may experience a sensitization to social activity and start to fear other schoolmates in general, perhaps becoming antisocial, withdrawn, and very upset about social interactions.

Putting all of the above in perspective, Organized Gangstalking leverages the emotion fear, conditioning and sensitization to create constant paranoia and worry. I will explain this below.

Organized Stalking at its commencement involves the vandalisation of property, changing the arrangement of furniture or cigarette butts in front of the door to indicate their presence and induce fear. This is coupled with constant road stalking, noisy environments and streettheater (rude behavior on the road, people passing comments, etc). Once you have been subjected to this daily harassment for a medium to long term, you get conditioned to it and would suspect any person walking on the road, cars moving are wholly intentional and with a malicious motive. The smart manoeuvre here is, that you are now conditioned and sensitized to commonly occurring harmless incidents. So rather than taking modern-day hostility, traffic jams and minor co-incidental hazards in your stride, you grow increasingly suspicious of it.

A mind can be conditioned to any stimulus and sensitization can be induced to any visual, verbal or auditory cue (colours, brand of cars, words, phrases, sounds, shoes, sunglasses, dogs barking, etc.). The resulting effect is you make seemingly unrelated connections to common details, things and phenomenon.

It is important to note that, fear is an emotion that drives and amplifies sensitization quite easily. Moreover, fear puts you in a state of constant worry, mushrooms countless irrational thoughts, depression and induces a persecution complex in the victims (Persecution complex is a feeling that other people are trying to harm them mentally or physically).

Organized Stalking would make you avoid situations or build defense mechanisms that obscure or distort the recognition of reality. In simple terms, it is an, extremely smart ploy to make you paranoid and destabilize you. Perpetrators (perps) of the crime don’t really have to inflict torture, or employ OG tactics 24/7, as the mind creates its own web of misery. Perps can then use their resources more efficiently with one perpetrator assigned to more than 5 targets.

The seldom appreciated fact of OG is that it is often (not necessary) tailored to a TI’s psychological make-up, personality characteristics and things they value. This further internalizes the harassment and deepens the depression.

Techniques used in Organized Gangstalking:

(a TI would face two or more of these)

  • Breaking into homes and shifting the contents – moving furniture, leaving a previously closed window open, taps turned on, etc.
  • Vandalism of property, vehicles
  • Smear Campaigns which include befriending people in your community and spreading lies about you.
  • Electronic items switch on/off on their own, and some malfunction constantly (with no apparent cause)
  • Cyberbullying and Cyberstalking
  • Emails sabotaged, missed calls, phone abruptly disconnects while talking
  • Street-theater (Ex- rude non-verbal expressions by strangers)
  • Group stalking on roads, malls, restaurants, etc
  • Noisy environments
  • Conditioning and Sensitization

Dealing with Organized Gangstalking:

Understand whats’ going on – It is good to read things, listen to people and develop a full understanding of what is happening with you. This will help you better tackle and be less reactive to the scare-tactics employed.

Learn to ignore – Perps want you to pay attention to every aspect of the harassment. Ignoring, avoiding, changing routes in an unpredictable manner nullifies the OG. It is the best way, to neutralize yourself and continue with your life. Think of OG tactics as the Schrodinger’s cat, in which you wouldn’t know whether the cat is alive or dead, until the box is opened and observed.

Refrain from isolating yourself – The OG program thrives on its camouflaged and obscure nature. It wouldn’t engage in tricks that make the harassment obvious to non-TI’s. Hence, staying with non-Tis, reduces the vexing OG.

Decipher the mind games goal – Conditioning, sensitization makes playing with the mind easy. Mind games instigate anger, delusions of persecution and reference. Mind Games are a relentless pursuit to drive you insane. Don’t fall in the trap.

Adapt – We live in strange times. It is normal to feel helpless, angry and exploited. Probably, you can learn a bit from people that live in terror zones. They often mention of getting ‘used to’ their harassment. This frees the mind and prevents from internalizing the daily depressive torment. Trash the inconsequential nonsense and focus on other things.

Add Humor – Adding humour gives you strength to face a situation. It also subdues the toxic effect of a negative circumstance on your psyche. It is easy to find humor in OG. Perps go to great lengths just to indicate their presence and terrorize you. I usually gag about how the mind games in OG are so interesting, that it seems utterly foolish at quite a few times.

 

Electronic Harassment

Electronic Harassment are weapons developed for covert harassment and torture of individual citizens. It is more of a slow-kill torture that induces fear, subjugation, diseases and decreases the quality of life. These weapons are developed during 1950’s or a bit prior to that. Currently, the technology of remote human manipulation is perfected. Electronic Harassment is done using satellites, mobile towers and ground-bases.

Electronic harassment involves:

  • Direct energy weapons (DEW)
  • Human bio-hacking (The technology used is not fully understood. A logical speculation would be there is a gap of knowledge of what is publically known and kept classified) 
  • IT harassment and manipulation of electrical devices

Dew Weapons can cause:

  • Sleep deprivation and headaches
  • Pain, heating, burns on body parts and organs (can be caused by microwaves, infrared and lasers)
  • Difficulty breathing, disorientation, vertigo and other malaise
  • Increased fatigue, nausea and cognitive dysfunction
  • Instill fear, aggression or depression (the right frequency directed with a directional antenna to a person can affect emotional states)
  • Microwave Auditory Effect – to beam voices, sounds and cause tinnitus
  • Strokes, heart attacks, memory loss
  • A wide variety of illnesses, including lupus, fibromyalgia, multiple sclerosis, chronic fatigue, lymphatic breakdown, depressed immune system, low t-cell count, cancer etc.
  • Long exposure to DEW can cause irritation in the skin and some may develop skin abberrations.

Human Bio-hacking

Human bio-hacking produces bizzare effects. A human brain works on bio-electricity, and anything that works on electricity can be hacked and manipulated. Harassment includes but is not limited to: 

  • Visual distortions and hallucinations
  • Psychosis and other mental illness
  • Scratching, burping, farting
  • Stomach pain, diarrhoea, urge to urinate, defecate
  • Sleepiness, yawning, difficulty sleeping. Control of sleep patterns: sleep deprivation or uncontrollable sleep to disturb the circardian rhythms.
  • Painful feet, arms, neck, back, muscle, chest
  • Spleen pain, Kidney pain and pain in other organs
  • Toothache, headaches
  • Runny nose, coughing, sneezing
  • Blurred vision, hearing problems
  • Manipulation of sexual organs (erection problems, pain in vagina during intercourse, sexual stimulation in public places, pain and pricks in sexual organs)
  • Sudden confusion, memory loss
  • Racing heart, fatigue, nausea
  •  Muscle twitching and pricks in the body

 

The quirky and startling ones:

  • Read thoughts remotely and implant personalities
  • Plant subliminal thoughts, induce forced speech. This is done to manipulate human behavior. Forced speech is a nasty one, can totally work against you.
  • Dream Manipulation
  • Hear voices
  • Involuntary laughter, crying and involuntary movement of hands, legs, neck
  • Manipulation of emotional states – depression, fear, anxiety, panic attacks, etc (Yes, they can make you feel angry, happy, disgust and pretty much anything)
  • Loss of memory and knowledge

IT harassment and manipulation of electrical devices

Remote Administration Tools (RAT) are used to remotely monitor a persons activities on computer, smart-phone and tablets. With RAT’s Perps’ can:

  • Remotely turn the camera on, play with the mouse, hang the computer or application
  • Manipulate excel sheets and tamper with work file or personal files
  • Sudden slow-web speed, wi-fi connection goes off (while others can connect)
  • Sudden closing of browser or video
  • Battery drain, automatic switching on a laptop, mobile, tablet after it is switched off (Switching on of devices is only possible if it has a stored charge)
  • Manipulation of Search engine results (controlling information)
  • Inject viruses and malwares
  • Selected Emails are deleted, considerable time in receiving and delivery of an important email.
  • Phone disconnects abruptly
  • Crafted Messages sent to your contacts or sent messages deleted before seen by the receiver
  • Certain posts, status updates on social media hidden from contacts
  • Word changes, grammatical errors, typos while chatting to make the message look unclear

The other electronic devices are manipulated, with a Perpetrator having access to the electric network of the TI’s house. As Internet-of-things (IoT) gets adopted, the harassment with electronic devices would get more freakish. Below are two ways in which electronic devices are disrupted and manipulated

  • Musical system, video games, etc (recently bought) stops working
  • Electronic devices (fridge, electric clock, lights, etc) go on and off on their own

The RAT’s used against Targeted Individuals are extremely sophisticated, custom-created with a variety of features. RAT’s employ smart network hacks (example: black hole – networking), and are very difficult to detect. Examples of RAT functionalities:

Electromagnetic Shielding

VisibleLightSpectrum

 

The above is the magnificent electromagnetic spectrum – the backbone of the information age. And sadly, a nightmare for TI’s. But, hey! technology is neutral. It is the corrupt human inclination, that puts it to wrong uses.

Human vision can see things in the spectrum withing a range of 390 nm to 700 nm. If we had enhanced vision and were able to visualize waves in the infrared spectrum, our perception of reality would be quite different. It is common knowledge, that human eyes see when light bounces off an object and touches the retina.

But ever wondered why do we see through glass and not from other solids or even a mirror? The photons (light particles) interact with the electrons of a material. When light is focused on a material, the electrons move and absorb certain frequencies of light, while a particular frequency is reflected. This reflected frequency is detected by the eye and we thus know the color of the object. So the color is not in the object itself, but in the light that strikes the object and ultimately reaches our eye. In the case of glass, the electrons are tightly bound to atoms and are not free to move. Hence, glass doesn’t absorb light and the light is transmitted through the glass. While in mirrors, a thin metal coating or film is attached at the back which reflects photons.

The above example is to give you a hint that understanding materials and their interaction with electromagnetic waves would help in constructing a robust shield.

Electromagnetic Shielding

When electromagnetic radiation is incident upon a material, it can undergo reflection, transmission and/or absorption. The goal for shielding is to effectively disrupt the electromagnetic waves. Targeting mainly involves harnessing radio waves and microwaves

Untitled

At high frequencies, most of the wave energy is reflected from a shield’s surface, while a smaller portion is absorbed. At lower frequencies, absorption generally predominates. Shielding performance is a function of the properties of the shielding material (including conductivity, permeability, permittivity and thickness), the frequency of waves and the geometrical design (shape, angle, etc).

The permittivity describes the coupling of the electric component of the incoming radiation with the material, whilst the permeability describes the coupling of the magnetic component. Higher permittivity will cause attenuation and higher permeability will cause reflection and absorption.

image12_w

 

Reflection: The primary mechanism for EMI shielding is usually reflection. For reflection of the radiation by the shield, the shield must have mobile charge carriers (electrons or holes) which interact with the electromagnetic fields in the radiation. The reflectivity of the material is determined by its conductivity and permeability.

Absorption: The absorption of the shielding material is determined by its conductivity, permittivity, permeability and thickness. For significant absorption of the radiation by the shield, the shield should have electric and/or magnetic dipoles which interact with the electromagnetic fields in the radiation. Electric dipoles will be provided by materials that have a high dielectric constant. Magnetic dipoles will be provided by materials that have a high value of magnetic permeability. Further, the absorption loss is proportional to the thickness of the shield. Electromagnetic radiation at high frequencies penetrates only the near surface region of an electric conductor. This is known as the skin effect. The electric field of a plane wave penetrating a conductor drops exponentially with increasing depth into the conductor.

Dielectric constant is the ratio of the permittivity of a substance to the permittivity of free space. The permittivity represents how difficult it is for the field to propagate inside a medium due to the response of the medium to the field.

Shielding Effectiveness:

Shielding effectiveness is defined as the ratio between an electromagnetic signal’s intensity before shielding (Eo) and its intensity after shielding (Es). Shielding Effectiveness is measured in dB.

Untitled1

Every 20 dB increase in SE represents a tenfold reduction in EM leakage through a shield.

You must have noticed that a radio in a conductive enclosure (example a steel jar) looses signal, but a mobile phone doesn’t. This is because the mobile phone has a high dynamic range which implies it can pick up small and large signals. A good shielding requires anything above 100 dB.

You can calculate the shielding effectiveness here: Shielding Effectiveness Calculator 

Shielding Methods

  • Faraday Cage (Conductive enclosure, best when nested and grounded)
  • Paints containing metal filaments
  • Clothing – custom made that provide EM shielding
  • Jammers (a jammer that is dynamic and emits signals at all radio frequencies should prevent dew attacks)

Nested – Built with layers of material, to increase thickness and hence attenuation.

What makes a reliable shielding? Something that:

  • protects over a broad range of frequencies
  • absorbs or diverts large energy bursts
  • shields against both magnetic and electrical fields
  • opens and closes repeatedly without degrading the shielding effectiveness
  • provides a consistently tight seal
  • Encloses the entire space to be shielded

Some of the Shielding Metals:

  • Nickel
  • Copper
  • Aluminium
  • Sliver
  • Brass
  • Bronze
  • Tin
  • Lead
  • Graphite
  • Mu-metal
  • Supermalloy

Supermalloy and mu-metals are good for absorption due to their high permeability, while aluminium, silver and copper are good for reflection due to their high conductivity.

There are plenty of companies manufacturing shielding materials. Do some research, spend some money and build or buy an effective shield.

Also, have a look at this: Scientists show a new way to absorb electromagnetic radiation

An anechoic chamber eliminates all external radio frequencies. It is a specifically designed room that absorbs all electromagnetic waves.

Anechoic-chamber.jpg

References:

http://wings.buffalo.edu/academic/department/eng/mae/cmrl/Materials%20for%20electromagnetic%20interference%20shielding.pdf

https://www.hftechnology.nl/downloads/pdf/IEEE-299-1997.pdf

 

 

History of Organized Gangstalking

ZERSETZUNG

Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) is a psychological warfare technique used to silence dissidents by political repression. It was first devised by the Nazi Germany and later adopted and refined by the Stasi, the East German secret police.

Erich Honecker, East Germany’s communist leader, patented these methods after concluding that ‘soft’ methods of torture were preferable to open forms of persecution. It was realized that psychological harassment was far less likely to be recognised for what it was. Thus, its victims, and their supporters, were less likely to be provoked into active resistance, given that they would often not be aware of the source of their problems or even its exact nature. Zersetzung was designed to leave victims totally unnerved and distressed psychologically, that they wouldn’t have the time and energy for anti-government activism. The inherent nature of deniability of psychological tactics was advantageous to GDR, as they wanted to maintain their international respectability.

UntitledThe practice of repression in Zersetzung comprised extensive and secret methods of control and psychological manipulation. The Stasi used Zersetzung essentially as a means of psychological oppression and persecution. Findings of operational psychology, were formulated into method at the Stasi’s College of Law (Juristische Hochschule der Staatssicherheit, or JHS), and applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilise them by subjecting them to repeated disappointment. Social undermining by alienation via interfering and disrupting their relationships with others. The Stasi intentionally concealed their role as mastermind of the operations.

Author Jürgen Fuchs was a victim of Zersetzung and wrote about his experience, describing the Stasi’s actions as ‘psychosocial crime’, and ‘an assault on the human soul’. The tactics were so subtle that vicitims found it hard to decipher the Stasi was behind their victimization. Many thought they were going mad, some suffered breakdowns and a few killed themselves. There are around 10,000 individuals estimated to have become victims, 5,000 of which have sustained irreversible damage.

Tactics employed under Zersetzung:

  • Breaking into homes and subtly manipulating the contents, in a form of gaslighting – moving furniture, altering the timing of an alarm, removing pictures from walls or replacing one variety of tea with another.
  • Releasing mice or poisonous snakes
  • Property damage, sabotage of cars, purposely incorrect medical treatment
  • Smear campaigns including sending falsified compromising photos or documents to the victim’s family
  • Bugging of private apartments, widespread phone tapping, physical surveillance, and email interception

Zersetzung is still prevalent in Russia and is covered by Luke Harding, the reporter of British newspaper Guardian in his book: Mafia State: How one reporter became an enemy of the brutal new Russia

Luke Harding arrived in Russia in 2007 as a correspondent for Guardian. Within months, mysterious agents from Russia’s Federal Security Service had broken into his flat and began harassing him with insidious techniques.

COINTELPRO

COINTELPRO, started in 1956, was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting and disrupting American political organizations. The cladestine project required the FBI to expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate the activities of certain movements and political organizations.

The program was exposed in 1971. The FBI used four main methods during COINTELPRO:

Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.

Psychological warfare: The FBI and police used myriad ‘dirty tricks’ to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketing to create suspicion about targeted activists, sometimes with lethal consequences.

Harassment via the legal system: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, investigative interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.

Illegal force: The FBI conspired with local police departments to threaten dissidents, to conduct illegal break-ins in order to search dissident homes, commit vandalism, assaults, beatings and assassinations. The object was to frighten or eliminate dissidents and disrupt their movements.

 

(Note – Much of the above is copy, pasted from Wikipedia)