Satellite Harassment

Space is a strategic resource. If you can control the space, you always are a step ahead of your opponent. Satellites were initially launched in the late 1950’s. The cold war era, with constant threat and Soviets secrecy, propelled the US military to build spy satellites to take pictures of the USSR and map the Soviets capability. The CIA launched a Corona project from 1959 to 1972, wherein reconnaissance (informally spy) satellites were used for photographic surveillance of the Soviet Union. Today, the satellites capability has increased ten-fold with the advancement in technology. A high-throughput satellite (HTS) has more than 100 Gbits/second of capacity. Also, a satellite can zoom into less than 20 cm^2 area on the earths’ surface.

Spy satellites are mainly in the lower-earth-orbit (LEO). The LEO stretches between 160-2000 kilometers. As per the inverse-square law (law of satellite communication systems), the smaller the distance, the easier it is to communicate. Secondarily, it is also easier to observe. Considering Snowden leaks and the recent Vault-7, there is little argument that the US government is spying around the globe and collecting any information they can get hold on. Between, did you know that the most valuable military weapon is information?

Information can be effectively used to manipulate, subjugate and falsely frame a person. With GPS, satellites can be used to track and even harass a human. Yet, the most dangerous use of satellites would be harnessing electromagnetic weapons. Directed energy weapon (DEW) is a form of electromagnetic weapon that emits highly focused energy to damage the target it is directed at. Potential applications of this technology include to disable anti-personnel weapon systems, missile defense system, vehicles (cars, drones, watercraft) and electronic devices (mobile phones, tablets, laptops). The same can be used lethally against humans as well, similar to the concept of death ray that is popular in science fiction. A non-lethal version of the electromagnetic-weaponry, known as the Active Denial System (ADS), focuses directed energy to heat up a part of the body and cause pain to the area it is pointed at. ADS works on the same principle as a microwave oven, exciting the water and fat molecules in the skin, and instantly heating them via dielectric heating. Moreover, other means to repress a target non-lethally would be to bombard him with microwaves/radio-waves using satellites which causes headaches, skin irritation, dryness, poor concentration, poor body balance, disrupts cognitive processes, etc.

There was a bill passed in 2001 by Dennis Kucinich in US to ban space-based weapons. Find it here: US Bill to Ban Space Weapons

The UN General Assembly has passed resolutions each year for the past 22 years calling all states to refrain from actions contrary to the peaceful use of outer space and for the prevention of an arms race in space. The resolution requests for a negotiation in the Conference on Disarmament. Most of these resolutions have been unanimous and without opposition, although the United States and a few other governments have repeatedly abstained.

There are thousands of victims popping around the globe claiming to be tracked, scrutinized, tortured and terrorized by satellites using electromagnetic (also called psychotronic) weapons. The interesting trend noticeable here is that the surge in the number of victims, remarkably coincides with the increase in number of satellites in space post-2000. The victims call themselves Targeted Individuals (TI). TI’s claim to live under constant surveillance and their lives are disrupted in ways nobody comprehends. Most TIs’ are unable to maintain a job, face vandalism of property and tampering of work, computers, mobile with hard-to-detect remote administration tools (RAT). The law enforcement agencies deny the illegal use of such weapons. The physical inflictions are easily discredited by Psychiatric institutions as somatoform disorders, psychosomatic or reasoning delusions. The thing about this covert technology (electromagnetic weapons) is – it is completely invisible, with little public awareness. Most people still believe, the weaponry today is just a bit more advanced versions of the ones demonstrated in World War 2.

SatelliteHarssment

Remote Neural Monitoring (RNM)

There is little public knowledge to the fact that the human brain is very susceptible to Extremely low frequency (ELF) waves, radio waves and microwaves. Brain works on bio-electricity and emits very low range radiation (1 Hz to 100 HZ depending on the brain state). Sending a particular frequency to the brain can alter mood, induce depression, nausea, incapacitate the person etc. However, can the same brain be hacked, just like any electronic device? And what does a brain-hack look like? 

Brain, a biological computing system, controls every function of the body. In a hacked brain you can make a person feel anything, induce thoughts, forced speech, psychosis, voices (synthetic telepathy), involuntary motor movements, read thoughts, manipulate facial expressions, alter consciousness states, behavior, etc. To cut it short, it is possible to have a complete mind-control. Current research in neuroscience, seems to make some progress on decoding the brain activities. However, in the present day a hacked brain seems too sci-fi and far-fetched. Astonishingly, it is claimed by TI’s that the brain has been decoded and their activities are constantly monitored using Remote Neural Monitoring (RNM) technology.

Remote Neural Monitoring in a very loose language is an advanced technology to hack a biological brain and nervous system. It is the method of reading, manipulating and influencing the brain with implants, biotelemetry, and a grid of dedicated infrastructure such as satellites, ground bases, fusion centres, mobile towers, etc. Biological neurons operate at a peak speed of about 200 Hz, a full seven orders of magnitude slower than an average modern microprocessor (~2 GHz). Also, axons carry action potentials at speed of 120 m/s or less whereas electronic processing cores can communicate at the speed of light. Most of the complicated circuitry of the brain is involved in sustaining the neuron’s life processes and has little to do with the way information is processed.  Thus, information sent via implants, towers, satellite-relays can be processed with high-speed computers at a base station (computers employing an advanced neural data processing software) and a brain can be constantly monitored.  The implants used for RNM often go undetected by MRI scanners. Implants, such as NIOB (Neural Input-Output Bus) with the help of nanotechnology, can go as small as the size of a grain of sand.

The RNM technology is highly sophisticated and 50 years ahead, kept classified as it is the ultimate weapon. The most intriguing aspect of RNM, is that it can be done without implants using remote sensing. Remote sensing is a method for acquisition of information about an object or phenomenon without making physical contact with the object via a satellite, aircraft, radar or other device. Our eyes and ears are a form of remote sensing and they work pretty well for a specific frequency range.  Remote sensing is used in numerous fields, including geography, land surveying and most Earth Science disciplines (for example, hydrology, ecology, oceanography, glaciology, geology). It also has military, intelligence, commercial, economic, planning, and humanitarian applications. Moreover, remote sensing is applied in astronomy as stars and hot celestial objects radiate electromagnetic radiation.

remote

RNM along with Signal Intelligence (SIGNIT), Measurement and signature intelligence (MASINT), and Electronic-Brain Link can remotely detect, identify and monitor a person’s bioelectric fields via a custom-built radar, satellite or other EMF equipment. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. Contained in the electromagnetic emission from the brain are spikes and patterns called evoked potentials. Evoked Potentials are the ones that get dominant, when a brain is performing a specific task. These can be picked up and decoded into a person’s brain-states and thoughts. Every human has his own unique bio-electric signature, just as the unique finger-prints. A radar, satellite can lock-in to the particular brain resonance frequency and remotely influence a brain. [Source: John St. Clair Akwei vs NSA]

[RNM, Electronic-Brain Link, SIGINT and MASINT are esoteric areas. The people who understand and work in these fields are bound by laws of secrecy and wouldn’t divulge any details]

Targeted Individuals often complain of synthetic telepathy. Synthetic telepathy is commonly known in the targeting space as voice-to-skull (V2k). You can buy one of your own device at Audio Spotlight Directional Sound System by HolosonicsIt sends a signal at 65 kHz, with a small wavelength. The short wavelength prevents the dispersion of sound. However, human hear sounds between 20 Hz to 20 kHz. The spotlight leverages a property of sound, wherein two sound waves interfering at high frequency create sound, thus modulating the wave in air. The narrow targeted beam is only heard by the person to which it is directed at. Additionally, another US non-lethal DEW weapon, MEDUSA (Mob Excess Deterrent Using Silent Audio) exploits the microwave auditory effect. When MEDUSA is fired, a beam of microwaves is turned into sound with the interaction with the human head. Nobody else can hear the sound unless they are in the beam space. MEDUSA is devised for crowd-control and can be deployed via satellite.

Most TI’s initial targeting involves synthetic telepathy and psychosis. This drives the target crazy and effectively discredits them. Once a person is proved insane, you can remotely do anything with the person, and nobody buys it. Psychiatry and medical science has achieved some impressive feats and have a good literature on the possible causes of psychosis, diseases and aberrations. Numerous times, there is no litmus test to identify which cause among the listed ones would have led to the psychosis/disease. Also if medical practitioners don’t understand the cause, they conveniently shift the blame to genetics or stress. Somehow, surprisingly, technology as a cause for psychosis, disorders and diseases is never accounted for. It could be due to psychiatric/medical technical-incompetence, information control, cognitive dissonance or plain close-minded professional demeanor .

Anyways, with capabilities of RNM, it is quite possible that the extent of surveillance today is way beyond anybody’s imagination. George Orwell would feel minuscule looking at the technological prowess and might of Big Brother in the present-day. Some courageous TI’s have approached the US Bio-ethics Commission and given their testimonies. Other TI’s have written numerous letters to human-right NGO’s, politicians and media-spokesman. The Bio-Ethics Commission side-lined TI claims saying that we do not deal with such issues, while others paid no heed to TI’s desperate cries for an investigation. TI’s have taken to internet to detail the misuse of this covert technology, their daily harassment and to create public awareness.

While the world seems to mock and ridicule the TI’s as a tin-foil hat joke, their lives see no end to this nightmare. Shifting locations doesn’t help as satellites cover the entire planet. The only hope in this perversely entrenched global deep state is a leak, confirming the existence of these technologies, and their use in non-consensual experimentation programs. Quite assuredly, the Shadow government would have got more vigilant and secured by now, as the potential irreparable damage to the nations’ governments if it blows up. Probably, a solar flare or coronal mass ejection (CME) from the sun inducing a geo-magnetic storm could destroy the workings of satellites and provide temporary relief from this selective dystopia for a few.

 

Advertisements

Electronic Harassment

Electronic Harassment are weapons developed for covert harassment and torture of individual citizens. It is more of a slow-kill torture that induces fear, subjugation, diseases and decreases the quality of life. These weapons are developed during 1950’s or a bit prior to that. Currently, the technology of remote human manipulation is perfected. Electronic Harassment is done using satellites, mobile towers and ground-bases.

Electronic harassment involves:

  • Direct energy weapons (DEW)
  • Human bio-hacking (The technology used is not fully understood. A logical deduction would be there is a gap of knowledge of what is publically known and kept classified) 
  • IT harassment and manipulation of electrical devices

Dew Weapons can cause:

  • Sleep deprivation and headaches
  • Pain, heating, burns on body parts and organs (can be caused by microwaves, infrared and lasers)
  • Difficulty breathing, disorientation, vertigo and other malaise
  • Increased fatigue, nausea and cognitive dysfunction
  • Instill fear, aggression or depression (the right frequency directed with a directional antenna to a person can affect emotional states)
  • Microwave Auditory Effect – to beam voices, sounds and cause tinnitus
  • Strokes, heart attacks, memory loss
  • A wide variety of illnesses, including lupus, fibromyalgia, multiple sclerosis, chronic fatigue, lymphatic breakdown, depressed immune system, low t-cell count, cancer etc.
  • Long exposure to DEW can cause irritation in the skin and some may develop skin abberrations.

Human Bio-hacking

Human bio-hacking produces bizzare effects. A human brain works on bio-electricity, and anything that works on electricity can be hacked and manipulated. Harassment includes but is not limited to: 

  • Visual distortions and hallucinations
  • Psychosis and other mental illness
  • Scratching, burping, farting
  • Stomach pain, diarrhoea, urge to urinate, defecate
  • Sleepiness, yawning, difficulty sleeping. Control of sleep patterns: sleep deprivation or uncontrollable sleep to disturb the circardian rhythms.
  • Painful feet, arms, neck, back, muscle, chest
  • Spleen pain, Kidney pain and pain in other organs
  • Toothache, headaches
  • Runny nose, coughing, sneezing
  • Blurred vision, hearing problems
  • Manipulation of sexual organs (erection problems, pain in vagina during intercourse, sexual stimulation in public places, pain and pricks in sexual organs)
  • Sudden confusion, memory loss
  • Racing heart, fatigue, nausea
  •  Muscle twitching and pricks in the body

 

The quirky and startling ones:

  • Read thoughts remotely and implant personalities
  • Plant subliminal thoughts, induce forced speech. This is done to manipulate human behavior. Forced speech is a nasty one, can totally work against you.
  • Dream Manipulation
  • Hear voices
  • Involuntary laughter, crying and involuntary movement of hands, legs, neck
  • Manipulation of emotional states – depression, fear, anxiety, panic attacks, etc. (Yes, they can make you feel angry, happy, disgust and pretty much anything)
  • Loss of memory and knowledge

IT harassment and manipulation of electrical devices

It harassment includes but is not limited to:

  • Remotely turn the camera on, play with the mouse, hang the computer or application
  • Manipulate excel sheets and tamper with work files or personal files
  • Slow the web speed, disconnect/disable wi-fi  (while others can connect)
  • Sudden closing of browser or video
  • Slow the download or upload speed of files. Sometimes, even cancel the download or upload.
  • Selected Emails are deleted, considerable time in receiving and delivery of an important email.

  • Crafted Messages sent to your contacts or sent messages deleted before seen by the receiver
  • Certain posts, status updates on social media hidden from contacts
  • Battery drain, automatic switching on a laptop, mobile, tablet after it is switched off (Switching on of devices is only possible if it has a stored charge)
  • Inject viruses and malwares
  • Phone disconnects abruptly
  • Word changes, grammatical errors, typos while chatting to make the message look unclear

The other electronic devices are manipulated, either with a Perpetrator having access to the electric grid of the TI’s house or with use of e-bombs. As Internet-of-things (IoT) gets adopted, the harassment with electronic devices would get more freakish. Below are two ways in which electronic devices are disrupted and manipulated

  • Musical system, xbox, Bluetooth, etc (recently bought) stop working
  • Electronic devices (fridge, electric clock, lights, etc) go on and off on their own

Remote Administration Tools (RAT), rootkits are used to remotely monitor a persons activities on computer, smart-phone and tablets. The RAT’s, rootkits used against Targeted Individuals are extremely sophisticated, custom-created with a variety of features. These are very difficult to detect and remove from a computer. Examples of RAT functionalities:

Electromagnetic Shielding (Basics)

VisibleLightSpectrum

 

The above is the magnificent electromagnetic spectrum – the backbone of the information age. And sadly, a nightmare for TI’s. But, hey! technology is neutral. It is the corrupt human inclination, that puts it to wrong uses.

Electromagnetic Shielding Basics

When electromagnetic radiation is incident upon a material, it can undergo reflection, transmission and/or absorption. The goal for shielding is to effectively disrupt the electromagnetic waves. Targeting mainly involves harnessing radio waves and microwaves.

Untitled

At high frequencies, most of the wave energy is reflected from a shield’s surface, while a smaller portion is absorbed. At lower frequencies, absorption generally predominates. Shielding performance is a function of the properties of the shielding material (including conductivity, permeability, permittivity and thickness), the frequency of waves and the geometrical design (shape, angle, etc).

The permittivity describes the coupling of the electric component of the incoming radiation with the material, whilst the permeability describes the coupling of the magnetic component. Higher permittivity will cause attenuation and higher permeability will cause reflection and absorption.

image12_w

Food for thought – Why do photons behave this way? 

Reflection: The primary mechanism for EMI shielding is usually reflection. For reflection of the radiation by the shield, the shield must have mobile charge carriers (electrons or holes) which interact with the electromagnetic fields in the radiation. The reflectivity of the material is determined by its conductivity and permeability.

Absorption: The absorption of the shielding material is determined by its conductivity, permittivity, permeability and thickness. For significant absorption of the radiation by the shield, the shield should have electric and/or magnetic dipoles which interact with the electromagnetic fields in the radiation. Electric dipoles will be provided by materials that have a high dielectric constant. Magnetic dipoles will be provided by materials that have a high value of magnetic permeability. Further, the absorption loss is proportional to the thickness of the shield. Electromagnetic radiation at high frequencies penetrates only the near surface region of an electric conductor. This is known as the skin effect. The electric field of a plane wave penetrating a conductor drops exponentially with increasing depth into the conductor.

Dielectric constant is the ratio of the permittivity of a substance to the permittivity of free space. The permittivity represents how difficult it is for the field to propagate inside a medium due to the response of the medium to the field.

Shielding Effectiveness:

Shielding effectiveness is defined as the ratio between an electromagnetic signal’s intensity before shielding (Eo) and its intensity after shielding (Es). Shielding Effectiveness is measured in dB.

Untitled1

Every 20 dB increase in SE represents a tenfold reduction in EM leakage through a shield.

You must have noticed that a radio in a conductive enclosure (example a metal jar) looses signal, but a mobile phone doesn’t. This is because the mobile phone has a high dynamic range. A high dynamic range implies that the cell phone antenna can pick up weak and large signals. A good shielding requires anything above 100 dB.

Find a calculator here: Shielding Effectiveness Calculator 

Shielding Methods

  • Faraday Cage (Conductive enclosure, best when nested and grounded)
  • Paints containing metal filaments
  • Clothing – custom made that provides EM shielding
  • Jammers (a jammer that is dynamic and emits signals at all radio frequencies should prevent attacks via EM waves)
  • Enclosure made out of Superconducting material (It works like a charm, but not really a feasible option for everyone)

Nested – Built with layers of material, to increase thickness and hence attenuation.

What makes a reliable shielding? Something that:

  • protects over a broad range of frequencies
  • absorbs or diverts large energy bursts
  • shields against both magnetic and electrical fields
  • opens and closes repeatedly without degrading the shielding effectiveness
  • provides a consistently tight seal
  • Encloses the entire space to be shielded

Note – Anything that leaks water can leak EM waves. 

In case you are implanted, metal-foil hats won’t work, as the radiation enters from the face. 

Some of the Shielding Metals:

  • Nickel
  • Copper
  • Aluminium
  • Sliver
  • Brass
  • Bronze
  • Tin
  • Lead
  • Graphite
  • Mu-metal
  • Supermalloy

Supermalloy and mu-metals are good for absorption due to their high permeability, while aluminium, silver and copper are good for reflection due to their high conductivity.

There are plenty of companies manufacturing shielding materials. Do some research, spend some money and build or buy an effective shield.

Link: Scientists show a new way to absorb electromagnetic radiation

An anechoic chamber eliminates all external radio frequencies. It is a specifically designed room that absorbs all electromagnetic waves.

Anechoic-chamber.jpg

References:

http://wings.buffalo.edu/academic/department/eng/mae/cmrl/Materials%20for%20electromagnetic%20interference%20shielding.pdf

https://www.hftechnology.nl/downloads/pdf/IEEE-299-1997.pdf

 

 

History of Organized Gangstalking

ZERSETZUNG

Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) is a psychological warfare technique used to silence dissidents by political repression. It was first devised by the Nazi Germany and later adopted and refined by the Stasi, the East German secret police.

Erich Honecker, East Germany’s communist leader, patented these methods after concluding that ‘soft’ methods of torture were preferable to open forms of persecution. It was realized that psychological harassment was far less likely to be recognised for what it was. Thus, its victims, and their supporters, were less likely to be provoked into active resistance, given that they would often not be aware of the source of their problems or even its exact nature. Zersetzung was designed to leave victims totally unnerved and distressed psychologically, that they wouldn’t have the time and energy for anti-government activism. The inherent nature of deniability of psychological tactics was advantageous to GDR, as they wanted to maintain their international respectability.

UntitledThe practice of repression in Zersetzung comprised extensive and secret methods of control and psychological manipulation. The Stasi used Zersetzung essentially as a means of psychological oppression and persecution. Findings of operational psychology, were formulated into method at the Stasi’s College of Law (Juristische Hochschule der Staatssicherheit, or JHS), and applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilise them by subjecting them to repeated disappointment. Social undermining by alienation via interfering and disrupting their relationships with others. The Stasi intentionally concealed their role as mastermind of the operations.

Author Jürgen Fuchs was a victim of Zersetzung and wrote about his experience, describing the Stasi’s actions as a ‘psychosocial crime’, and ‘an assault on the human soul’. The tactics were so subtle that vicitims found it hard to decipher that the Stasi was behind their victimization. Many thought they were going mad, some suffered breakdowns and a few killed themselves. There are around 10,000 individuals estimated to have become victims, 5,000 of which have sustained irreversible damage.

Tactics employed under Zersetzung:

  • Breaking into homes and subtly manipulating the contents, in a form of gaslighting – moving furniture, altering the timing of an alarm, removing pictures from walls or replacing one variety of tea with another.
  • Releasing mice or poisonous snakes
  • Property damage, sabotage of cars, purposely incorrect medical treatment
  • Smear campaigns including sending falsified compromising photos or documents to the victim’s family
  • Bugging of private apartments, widespread phone tapping, physical surveillance, and email interception

Zersetzung is still prevalent in Russia and is covered by Luke Harding, the reporter of British newspaper Guardian in his book: Mafia State: How one reporter became an enemy of the brutal new Russia

Luke Harding arrived in Russia in 2007 as a correspondent for Guardian. Within months, mysterious agents from Russia’s Federal Security Service had broken into his flat and began harassing him with insidious techniques.

COINTELPRO

COINTELPRO, started in 1956, was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting and disrupting American political organizations. The cladestine project required the FBI to expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate the activities of certain movements and political organizations.

The program was exposed in 1971. The FBI used four main methods during COINTELPRO:

Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.

Psychological warfare: The FBI and police used myriad ‘dirty tricks’ to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketing to create suspicion about targeted activists, sometimes with lethal consequences.

Harassment via the legal system: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, investigative interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.

Illegal force: The FBI conspired with local police departments to threaten dissidents, to conduct illegal break-ins in order to search dissident homes, commit vandalism, assaults, beatings and assassinations. The object was to frighten or eliminate dissidents and disrupt their movements.

 

(Note – Much of the above is copy, pasted from Wikipedia)

 

 

Why the Common Public dosen’t believe in Unlawful Targeting of Law-abiding Citizens?

imagee

 

When Targeted Individuals talk about targeting openly, there are a bunch of terms thrown to marginalize, deprecate, denigrate and discredit TI’s. Fringe groups, paranoid, delusional, schizophrenic,  persecutory delusional disorder, conspiracy theorist, unconventional and deranged theories, tin-foil hat folks, lunatics,etc. The best one I came across was “crippled epistemology”

The above diagram is for people, who claim that TI’s have a crippled epistemology.