Satellite Harassment

Space is a strategic resource. If you can control the space, you always are a step ahead of your opponent. Satellites were initially launched in the late 1950’s. The cold war era, with constant threat and Soviets secrecy, propelled the US military to build spy satellites to take pictures of the USSR and map the Soviets capability. The CIA launched a Corona project from 1959 to 1972, wherein reconnaissance (informally spy) satellites were used for photographic surveillance of the Soviet Union. Today, the satellites capability has increased ten-fold with the advancement in technology. A high-throughput satellite (HTS) has more than 100 Gbits/second of capacity. Also, a satellite can zoom into less than 20 cm^2 area on the earths’ surface.

Spy satellites are mainly in the lower-earth-orbit (LEO). The LEO stretches between 160-2000 kilometers. As per the inverse-square law (law of satellite communication systems), the smaller the distance, the easier it is to communicate. Secondarily, it is also easier to observe. Considering Snowden leaks and the recent Vault-7, there is little argument that the US government is spying around the globe and collecting any information they can get hold on. Between, did you know that the most valuable military weapon is information?

Information can be effectively used to manipulate, subjugate and falsely frame a person. With GPS, satellites can be used to track and even harass a human. Yet, the most dangerous use of satellites would be harnessing electromagnetic weapons. Directed energy weapon (DEW) is a form of electromagnetic weapon that emits highly focused energy to damage the target it is directed at. Potential applications of this technology include to disable anti-personnel weapon systems, missile defense system, vehicles (cars, drones, watercraft) and electronic devices (mobile phones, tablets, laptops). The same can be used lethally against humans as well, similar to the concept of death ray that is popular in science fiction. A non-lethal version of the electromagnetic-weaponry, known as the Active Denial System (ADS), focuses directed energy to heat up a part of the body and cause pain to the area it is pointed at. ADS works on the same principle as a microwave oven, exciting the water and fat molecules in the skin, and instantly heating them via dielectric heating. Moreover, other means to repress a target non-lethally would be to bombard him with microwaves/radio-waves using satellites which causes headaches, skin irritation, dryness, poor concentration, poor body balance, disrupts cognitive processes, etc.

There was a bill passed in 2001 by Dennis Kucinich in US to ban space-based weapons. You can find it here: US Bill to Ban Space Weapons

The UN General Assembly has passed resolutions each year for the past 22 years calling all states to refrain from actions contrary to the peaceful use of outer space and for the prevention of an arms race in space. The resolution requests for a negotiation in the Conference on Disarmament. Most of these resolutions have been unanimous and without opposition, although the United States and a few other governments have repeatedly abstained.

There are thousands of victims popping around the globe claiming to be tracked, scrutinized, tortured and terrorized by satellites using electromagnetic (also called psychotronic) weapons. The interesting trend noticeable here is that the surge in the number of victims, remarkably coincides with the increase in number of satellites in space post-2000. The victims call themselves Targeted Individuals (TI). TI’s claim to live under constant surveillance and their lives are disrupted in ways nobody comprehends. Most TIs’ are unable to maintain a job, face vandalism of property and tampering of work, computers, mobile with hard-to-detect remote administration tools (RAT). The law enforcement agencies deny the illegal use of such weapons. The physical inflictions are easily discredited by Psychiatric institutions as somatoform disorders, psychosomatic or reasoning delusions. The thing about this covert technology (electromagnetic weapons) is – it is completely invisible, with little public awareness. Most people still believe, the weaponry today is just a bit more advanced versions of the ones demonstrated in World War 2.


Remote Neural Monitoring (RNM)

There is little public knowledge to the fact that the human brain is very susceptible to Extremely low frequency (ELF) waves, radio waves and microwaves. Brain works on bio-electricity and emits very low range radiation (1 Hz to 100 HZ depending on the brain state). Sending a particular frequency to the brain can alter mood, induce depression, nausea, incapacitate the person etc. However, can the same brain be hacked, just like any electronic device? And what does a brain-hack look like? 

Brain, a biological computing system, controls every function of the body. In a hacked brain you can make a person feel anything, induce thoughts, psychosis, voices (synthetic telepathy), involuntary motor movements, read thoughts, etc. To cut it short, it is possible to have a complete mind-control. Current research in neuroscience, seems to make some progress on decoding the brain activities. However, in the present day a hacked brain seems too sci-fi and far-fetched. Astonishingly, it is claimed by TI’s that the brain has been decoded and their activities are constantly monitored using Remote Neural Monitoring (RNM) technology.

Remote Neural Monitoring in a very loose language is an advanced technology to hack a biological brain and nervous system. It is the method of reading, manipulating and influencing the brain with implants, biotelemetry, and a grid of dedicated infrastructure such as satellites, ground bases, fusion centres, mobile towers, etc. Biological neurons operate at a peak speed of about 200 Hz, a full seven orders of magnitude slower than an average modern microprocessor (~2 GHz). Also, axons carry action potentials at speed of 120 m/s or less whereas electronic processing cores can communicate at the speed of light. Most of the complicated circuitry of the brain is involved in sustaining the neuron’s life processes and has little to do with the way information is processed.  Thus, information sent via implants, towers, satellite-relays can be processed with high-speed computers at a base station (computers employing an advanced neural data processing software) and a brain can be constantly monitored.  The implants used for RNM are quite small , and often go undetected by MRI scanners. Implants, such as NIOB (Neural Input-Output Bus) with the help of nanotechnology, can go as small as the size of a grain of sand.

The RNM technology is highly sophisticated and 50 years ahead, kept classified as it is the ultimate weapon. The most intriguing aspect of RNM, is that it can be done without implants using remote sensing. Remote sensing is a method for acquisition of information about an object or phenomenon without making physical contact with the object via a satellite, aircraft, radar or other device. Our eyes and ears are a form of remote sensing and they work pretty well for a specific frequency range.  Remote sensing is used in numerous fields, including geography, land surveying and most Earth Science disciplines (for example, hydrology, ecology, oceanography, glaciology, geology). It also has military, intelligence, commercial, economic, planning, and humanitarian applications. Moreover, remote sensing is applied in astronomy as stars and hot celestial objects radiate electromagnetic radiation.


RNM along with Signal Intelligence (SIGNIT), Measurement and signature intelligence (MASINT), and Electronic-Brain Link can remotely detect, identify and monitor a person’s bioelectric fields via a custom-built radar, satellite or other EMF equipment. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. Contained in the electromagnetic emission from the brain are spikes and patterns called evoked potentials. Evoked Potentials are the ones that get dominant, when a brain is performing a specific task. These can be picked up and decoded into a person’s brain-states and thoughts. Every human has his own unique bio-electric signature, just as the unique finger-prints. A radar, satellite can lock-in to the particular brain resonance frequency and remotely influence a brain.

[RNM, Electronic-Brain Link, SIGINT and MASINT are esoteric areas. These collectively form part of the global surveillance network architecture, and are an analogous extension of C4ISTR systems. The people who understand and work in these fields are bound by laws of secrecy and wouldn’t divulge any details. There are massive power structures, stringent information control and disinformation, discrediting campaigns (such as astroturfing, sock-puppetry, JTRIG activities, etc) in place to keep such technologies and their clandestine operations a secret.]

Targeted Individuals often complain of synthetic telepathy. Synthetic telepathy is commonly known in the targeting space as voice-to-skull (V2k). You can buy one of your own device at Audio Spotlight Directional Sound System by HolosonicsIt sends a signal at 65 kHz, with a small wavelength. The short wavelength prevents the dispersion of sound. However, human hear sounds between 20 Hz to 20 kHz. The spotlight leverages a property of sound, wherein two sound waves interfering at high frequency create sound, thus modulating the wave in air. The narrow targeted beam is only heard by the person to which it is directed at. Additionally, another US non-lethal DEW weapon, MEDUSA (Mob Excess Deterrent Using Silent Audio) exploits the microwave audio effect to create sounds by stimulating the auditory cortex. When MEDUSA is fired, a beam of microwaves is turned into sound with the interaction with the human head. Nobody else can hear the sound unless they are in the beam space. MEDUSA is devised for crowd-control and can be deployed via satellite.

Most TI’s initial targeting involves synthetic telepathy and psychosis. This drives the target crazy and effectively discredits them. Once a person is proved insane, you can remotely do anything with the person, and nobody buys it. Psychiatry and medical science has achieved some impressive feats and have a good literature on the possible causes of psychosis, diseases and aberrations. Numerous times, there is no litmus test to identify which cause among the listed ones would have led to the psychosis, disorder or disease. Also if medical practitioners don’t understand the cause, they conveniently shift the blame to genetics or stress. Somehow, surprisingly, technology as a cause for psychosis, disorders and diseases is never accounted for. It could be due to psychiatric/medical technical-incompetence, information control, cognitive dissonance or plain close-minded professional demeanor .

Anyways, with capabilities of RNM, the state of surveillance today is way beyond anybody’s imagination. George Orwell would feel minuscule at the extent of surveillance and the might of Big Brother in the present-day. Some bold TI’s have approached the US Bio-ethics Commission and given their testimonies. Other TI’s have written numerous letters to human-right NGO’s, politicians and media-spokesman. The Bio-Ethics Commission side-lined TI claims saying that we do not deal with such issues, while others paid no heed to TI’s desperate cries for an investigation. TI’s have taken to internet to detail the misuse of this covert technology, their daily harassment and to create public awareness.

While the world seems to mock and ridicule the TI’s as a tin-foil hat joke, their lives see no end to this nightmare. Shifting locations doesn’t help as satellites cover the entire planet. The only hope in this perversely entrenched global deep state is a leak, confirming its existence. Quite assuredly, the Shadow government would have got more vigilant and secured by now, as the potential irreparable damage to the nations’ governments if it blows up. Probably, a solar flare or coronal mass ejection (CME) from the sun inducing a geo-magnetic storm could destroy the workings of satellites and provide temporary relief from this selective dystopia for a few.



Organised Gangstalking Today

“Organized Stalking is a form of terrorism used against an individual in a malicious attempt to reduce the quality of a person’s life so they will: have a nervous break-down, become incarcerated, institutionalized, experience constant mental, emotional, or physical pain, become homeless, and/or commit suicide. This is done using well-orchestrated accusations, lies, rumors, bogus investigations, setups, framings, intimidation, overt or covert threats, vandalism, thefts, sabotage, torture, humiliation, emotional terror and general harassment. It is a “ganging up” by members of the community who follow an organizer and participate in a systematic “terrorizing” of an individual.

To give a bit of background, the origination of Organised Gangstalking traces back to Zersetzung (used by Nazi Germany and later Stasi) and COINTELPRO (Used by US in 1956). Zersetzung is a psychological warfare technique devised to silence dissidents by repression using personal information, ingenious tactics and an access to a variety of institutions. Zersetzung involves a number of psychological manipulation techniques to disrupt the targets life. If you get into the details of Zersetzung, it was an immensely clever, subtle form of psychological harassment, where victims themselves were unable to figure that the Stasi was responsible for their victimization. Infact, it was so elusive that its very existence was plausibly denied. Many victims thought they were losing their minds, had mental breakdowns and some committed suicide.




Stasi has been described as one of the most effective, repressive intelligence and secret police agencies to have ever existed. You can find the details here of the history of Organized Gangstalking .


 “The more intelligent a society grows, the less it needs violence to achieve its means”

Understanding Organized Gangstalking in the Present Day Scenario

Organized Gangstalking today goes beyond Zersetzung, though many of its techniques are still used by the perpetrators of the crime. (The end goal remains the same as Zersetzung.) OG along with Zerstezung employs Psychological Operations (PSYOPs) techniques, current psychological research and technology to terrorize a victim. OG is an extremely sophisticated program and an effective form of mind control. The Organized Gangstalking leverages the way the mind works to make an efficient use of resources, discredit the victim and destabilize them.

To understand Organised Gangstalking in the current-day, you need to understand the psychology of fear and some psychological terms: Conditioning (associative learning) and sensitization (non-associative learning). I wouldn’t dwell on PSYOPs methods and the technological aspects of OG (Technology is used for GPS  tracking of the TI,  gauging stress, emotional responses to an external stimuli, etc). 

Mind on Fear


Emotions are a complicated process in the electro-chemical brain. The emotion fear, in terms of neurology, is the best understood of all emotions. (This is as per publicized research) Fear is an innate emotion, that triggers easily. The almond-shaped amygdala is considered to be the seat of fear in the brain. When a mind is subject to fear it shifts into fight and flight mode.

Humans share five basic fears:


OG mainly taps on loss of autonomy and ego death. Loss of autonomy is the fear of being restricted, entrapped, imprisoned, smothered, or otherwise controlled by circumstances beyond our control. While, Ego death is the fear of humiliation, embarrassment or any other mechanism that is of profound self-disapproval and threatens the loss of integrity of the Self.

A frightening stimulus, triggers certain psychological responses such as sweating, faster heart beat, shortness of breath, etc. Fear can be invoked just by observation and thus we feel scared during and after scary movies. The interesting part is, fear can trigger emotions and fears unconsciously—without the mind even realizing it. For example: You are at a coffee shop and the waitor taking the order is rude to you. He is wearing a blue-checkered apron. The next day when you see somebody coming down the street and think, “I have this gut feeling about this guy, he’s involved in my harrasment and I don’t like him”. Probably, the guy is also wearing a blue-checkered tie. Consciously, you would be saying I have a gut feeling because I don’t like the way he looks. However, what has happened is that the necktie has triggered the activation of the amygdala through the thalamus. Consequently, the activation has triggered a fear response, which you are consciously interpreting as this gut feeling about not liking the guy. In reality, it is triggered by external stimuli that you are not processing consciously.

The unconscious processing of frightening stimuli happens much more quickly than our conscious processing of it. To become consciously aware of a particular stimulus takes 250-300 milliseconds, while a fear-evoking stimulus can reach the amygdala in a mere 12 milliseconds, which is evolutionarily advantageous if one’s response time means the difference between life and death.

Thus, the fear emotion is a necessity and important for adaptation, survival. However, the downside is, if a human brain is subject to constant fear it can hamper the working memory and reduce the neural feedback. Sustained worry and fear would change the brain architecture, as well as the impulse control. Fear can interrupt processes in our brains that allow us to regulate emotions, read non-verbal cues and other information presented to us. Consequently, in a whole, it impacts the thinking and decision-making in negative ways, affecting the interpretation of events. It will also leave the human brain more susceptible to intense emotions and impulsive reactions. All of these effects would leave a person unable to act appropriately.

Moreover, constant subject to fear produces immense cortisol, the stress hormone. The long term effects of being subject to fear is chronic stress, free-floating anxiety, worry, daily insecurity, weakened immune system, gastrointestinal problems such as ulcers, irritable bowl syndrome, adverse mental health, etc.

Classical Conditioning  Also called Pavlovian conditioning, is a core method of understanding biological behavior in psychology. Classical conditioning, an associative learning technique, is widely used in advertising to pair products with a certain behavioral response, and to create brand appeals. It is a method, in which a mind is conditioned to a learning procedure wherein a stimulus (eg: burger) is paired with a previously neutral stimulus (eg: McDonalds logo). The pairing would elicit a response (eg: salivation, hunger). Conditioning uses the conditional reflex phenomenon. During the conditioning procedure, responses to certain stimuli are acquired where no responses existed previously. 

The constant urge to check your phone as soon as you hear the phone notification sound, is an example of classical conditioning in action. It is worth noting that much of the classical conditioning is mediated unconsciously, beneath the horizon of our conscious awareness. The circuits in the brain that are responsible for classical conditioning, are not associated with cognitive evaluation and are different from those responsible for our episodic, autobiographical memories, memories that at times, can be experienced consciously. Unlike other forms of conditioning, the conditioned response in classical conditioning (e.g., the cravings one experience when looking at a beautiful cake) cannot be suppressed at will; they are ‘involuntary.’ One can suppress behaviors but not the urges associated with them.

Fear conditioning leads humans to learn to predict aversive events. It is a form of learning in which an aversive stimulus (e.g. an electrical shock) is associated with a particular neutral context (e.g., a room) or neutral stimulus (e.g., loud noise), resulting in the expression of fear responses to the originally neutral stimulus or context. Eventually, the neutral stimulus alone can elicit the state of fear.

Sensitization – Sensitization refers to a non-associative learning process, in which repeated exposure to a stimulus results in the progressive amplification (increasing strength) of the reaction to the stimulus. The brain becomes more sensitive to the stimulus as time progresses. For instance, a child who is bullied at school, initially wouldn’t bother much. However, as time goes on and the stimulus (bullying) is re-experienced repeatedly, the child may experience a sensitization to social activity and start to fear other schoolmates in general, perhaps becoming antisocial, withdrawn, and very upset about social interactions.

Putting all of the above in perspective, Organized Gangstalking leverages the emotion fear, conditioning and sensitization to make you delusional, create constant paranoia and worry . I will explain this below.

Organized Stalking at its commencement involves the vandalisation of property, changing the arrangement of furniture or cigarette butts in front of the door to indicate a perpetrators presence and induce fear. This is coupled with constant road stalking, noisy environments and streettheater (rude behavior on the road, people passing comments, etc). Once you have been subjected to this daily harassment for a medium to long term, you get conditioned to it and would suspect any person walking on the road, cars moving as wholly intentional and with a malicious motive. The smart manoeuvre here is, that you are now conditioned and sensitized to commonly occurring harmless incidents. So rather than taking modern-day hostility, traffic jams and minor co-incidental hazards in your stride, you grow increasingly suspicious of it.

A mind can be conditioned to any stimulus and sensitization can be induced to any visual, verbal or auditory cue (colours, brand of cars, words, phrases, sounds, symbols, shoes, sunglasses, dogs barking, etc.). The resulting effect is you make seemingly unrelated connections to common details, everyday things and phenomenon. This in effect, prompts a delusion of reference (Delusion of reference – is the false belief that irrelevant occurrences or details in the world relate directly to oneself.)

It is important to note that, fear is an emotion that drives and amplifies sensitization quite easily. Moreover, fear puts you in a state of depression, constant worry, mushrooms countless irrational thoughts, and induces a persecution complex in the victims (Persecution complex is a feeling that other people are trying to harm them mentally or physically via spying, stalking, etc). 

Organized Stalking would make you avoid situations or build defense mechanisms that obscure or distort the recognition of reality. In simple terms, it is an, extremely smart, ingenious ploy to make you paranoid and destabilize you. Perpetrators (perps) of the crime don’t really have to inflict torture, or employ OG tactics 24/7, as the mind creates its own web of misery. Perps can then use their resources more efficiently with one perpetrator assigned to more than 5 targets. I am not saying that Perpetrators are not strategically and subtly harassing you, after a certain point of time. All, I mean to imply is, the OG harassment is probably 40-60%, while the rest has to do with the frame of thinking your mind adopts affecting the perception, and interpretation of things, events,etc.

The seldom appreciated fact of OG is that it is often (not necessary) tailored to a TI’s psychological make-up, personality characteristics and things they value. This further internalizes the harassment and deepens the depression.

Techniques used in Organized Gangstalking:

  • Breaking into homes and shifting the contents – moving furniture, leaving a previously closed window open, taps turned on, etc.
  • Vandalism of property, vehicles
  • Smear Campaigns which include befriending people in your community and spreading lies about you.
  • Electronic items switch on/off on their own, and some malfunction constantly (with no apparent cause)
  • Cyberbullying and Cyberstalking
  • Emails sabotaged, missed calls, phone abruptly disconnects while talking
  • Street-theater (Eg- rude non-verbal expressions by strangers)
  • Group stalking on roads, in malls, restaurants, etc
  • Noisy environments
  • Conditioning and Sensitization
  • PSYOPs techniques 

Dealing with Organized Gangstalking:

Understand whats’ going on – It is good to read things, listen to people and develop a full understanding of what is happening with you. This will help you better tackle and be less reactive to the scare-tactics employed.

Learn to ignore – Perps compete for your attention just like brands, apps and social sites. They want you to pay attention to every aspect of the harassment. Ignoring, avoiding, changing routes in an unpredictable manner nullifies the OG. It is the best way, to neutralize yourself and continue with your life. Think of OG tactics as the Schrodinger’s cat, in which you wouldn’t know whether the cat is alive or dead, until the box is opened and observed.

Refrain from isolating yourself – The OG program thrives on its camouflaged and obscure nature. It wouldn’t engage in tricks that make the harassment obvious to non-TI’s. Hence, staying with non-Tis, reduces the vexing OG.

Decipher the mind games goal – Conditioning, sensitization makes playing with the mind easy. Mind games instigate anger, delusions of persecution and reference. Mind Games are a relentless pursuit to drive you insane. Don’t fall in the trap. 

Adapt – We live in strange times. It is normal to feel helpless, angry and exploited. Probably, you can learn a bit from people that live in terror zones. They often mention of getting ‘used to’ their harassment. This frees the mind and prevents from internalizing the daily depressive torment. Trash the inconsequential nonsense and focus on other things.

Gaslighting – Most people will gaslight you either intentionally or unintentionally (out of ignorance).  The doctors and law enforcement would call you crazy, because thats’ what they are told to say. Some doctors are pretty sure this is going on and are complicit in the crime. Others, are just as ignorant as your well meaning family members.

Add Humor – Adding humour gives you strength to face a situation. It also subdues the toxic effect of a negative circumstance on your psyche. It is easy to find humor in OG. Perps go to great lengths just to indicate their presence and terrorize you. I usually gag about how the mind games in OG are so interesting, that it seems utterly foolish at a number of instances.

Note –   This is my own analysis on the topic, and I have no academic background in Psychology. I feel compelled to present it since, it is my observation that TI’s get so overwhelmed with their targeting, that they fail to recognize the clever tricks employed. Feel free to expand on the above and make use of whatever applies to you.  



Electronic Harassment

Electronic Harassment are weapons developed for covert harassment and torture of individual citizens. It is more of a slow-kill torture that induces fear, subjugation, diseases and decreases the quality of life. These weapons are developed during 1950’s or a bit prior to that. Currently, the technology of remote human manipulation is perfected. Electronic Harassment is done using satellites, mobile towers and ground-bases.

Electronic harassment involves:

  • Direct energy weapons (DEW)
  • Human bio-hacking (The technology used is not fully understood. A logical speculation would be there is a gap of knowledge of what is publically known and kept classified) 
  • IT harassment and manipulation of electrical devices

Dew Weapons can cause:

  • Sleep deprivation and headaches
  • Pain, heating, burns on body parts and organs (can be caused by microwaves, infrared and lasers)
  • Difficulty breathing, disorientation, vertigo and other malaise
  • Increased fatigue, nausea and cognitive dysfunction
  • Instill fear, aggression or depression (the right frequency directed with a directional antenna to a person can affect emotional states)
  • Microwave Auditory Effect – to beam voices, sounds and cause tinnitus
  • Strokes, heart attacks, memory loss
  • A wide variety of illnesses, including lupus, fibromyalgia, multiple sclerosis, chronic fatigue, lymphatic breakdown, depressed immune system, low t-cell count, cancer etc.
  • Long exposure to DEW can cause irritation in the skin and some may develop skin abberrations.

Human Bio-hacking

Human bio-hacking produces bizzare effects. A human brain works on bio-electricity, and anything that works on electricity can be hacked and manipulated. Harassment includes but is not limited to: 

  • Visual distortions and hallucinations
  • Psychosis and other mental illness
  • Scratching, burping, farting
  • Stomach pain, diarrhoea, urge to urinate, defecate
  • Sleepiness, yawning, difficulty sleeping. Control of sleep patterns: sleep deprivation or uncontrollable sleep to disturb the circardian rhythms.
  • Painful feet, arms, neck, back, muscle, chest
  • Spleen pain, Kidney pain and pain in other organs
  • Toothache, headaches
  • Runny nose, coughing, sneezing
  • Blurred vision, hearing problems
  • Manipulation of sexual organs (erection problems, pain in vagina during intercourse, sexual stimulation in public places, pain and pricks in sexual organs)
  • Sudden confusion, memory loss
  • Racing heart, fatigue, nausea
  •  Muscle twitching and pricks in the body


The quirky and startling ones:

  • Read thoughts remotely and implant personalities
  • Plant subliminal thoughts, induce forced speech. This is done to manipulate human behavior. Forced speech is a nasty one, can totally work against you.
  • Dream Manipulation
  • Hear voices
  • Involuntary laughter, crying and involuntary movement of hands, legs, neck
  • Manipulation of emotional states – depression, fear, anxiety, panic attacks, etc. (Yes, they can make you feel angry, happy, disgust and pretty much anything)
  • Loss of memory and knowledge

IT harassment and manipulation of electrical devices

Remote Administration Tools (RAT), rootkits are used to remotely monitor a persons activities on computer, smart-phone and tablets. With RAT’s Perps’ can:

  • Remotely turn the camera on, play with the mouse, hang the computer or application
  • Manipulate excel sheets and tamper with work files or personal files
  • Sudden slow-web speed, wi-fi connection goes off (while others can connect)
  • Sudden closing of browser or video
  • Slow the download or upload speed of files. Sometimes, even cancel the download or upload.
  • Battery drain, automatic switching on a laptop, mobile, tablet after it is switched off (Switching on of devices is only possible if it has a stored charge)
  • Manipulation of Search engine results (controlling information)
  • Inject viruses and malwares
  • Selected Emails are deleted, considerable time in receiving and delivery of an important email.
  • Phone disconnects abruptly
  • Crafted Messages sent to your contacts or sent messages deleted before seen by the receiver
  • Certain posts, status updates on social media hidden from contacts
  • Word changes, grammatical errors, typos while chatting to make the message look unclear

The other electronic devices are manipulated, with a Perpetrator having access to the electric network of the TI’s house. As Internet-of-things (IoT) gets adopted, the harassment with electronic devices would get more freakish. Below are two ways in which electronic devices are disrupted and manipulated

  • Musical system, video games, etc (recently bought) stop working
  • Electronic devices (fridge, electric clock, lights, etc) go on and off on their own

The RAT’s, rootkits used against Targeted Individuals are extremely sophisticated, custom-created with a variety of features. These are very difficult to detect and remove from a computer. (NSA leaks gives a good idea of the IT prowess of the Perp system). Examples of RAT functionalities:

Electromagnetic Shielding



The above is the magnificent electromagnetic spectrum – the backbone of the information age. And sadly, a nightmare for TI’s. But, hey! technology is neutral. It is the corrupt human inclination, that puts it to wrong uses.

Human vision can see things in the spectrum withing a range of 390 nm to 700 nm. If we had enhanced vision and were able to visualize waves in the infrared spectrum, our perception of reality would be quite different. It is common knowledge, that human eyes see when light bounces off an object and touches the retina.

But ever wondered why do we see through glass and not from other solids or even a mirror? The photons (light particles) interact with the electrons of a material. When light is focused on a material, the electrons move and absorb certain frequencies of light, while a particular frequency is reflected. This reflected frequency is detected by the eye and we thus know the color of the object. So the color is not in the object itself, but in the light that strikes the object and ultimately reaches our eye. In the case of glass, the electrons are tightly bound to atoms and are not free to move. Hence, glass doesn’t absorb light and the light is transmitted through the glass. While in mirrors, a thin metal coating or film is attached at the back which reflects photons.

The above example is to give you a hint that understanding materials and their interaction with electromagnetic waves would help in constructing a robust shield.

Electromagnetic Shielding

When electromagnetic radiation is incident upon a material, it can undergo reflection, transmission and/or absorption. The goal for shielding is to effectively disrupt the electromagnetic waves. Targeting mainly involves harnessing radio waves and microwaves.


At high frequencies, most of the wave energy is reflected from a shield’s surface, while a smaller portion is absorbed. At lower frequencies, absorption generally predominates. Shielding performance is a function of the properties of the shielding material (including conductivity, permeability, permittivity and thickness), the frequency of waves and the geometrical design (shape, angle, etc).

The permittivity describes the coupling of the electric component of the incoming radiation with the material, whilst the permeability describes the coupling of the magnetic component. Higher permittivity will cause attenuation and higher permeability will cause reflection and absorption.



Reflection: The primary mechanism for EMI shielding is usually reflection. For reflection of the radiation by the shield, the shield must have mobile charge carriers (electrons or holes) which interact with the electromagnetic fields in the radiation. The reflectivity of the material is determined by its conductivity and permeability.

Absorption: The absorption of the shielding material is determined by its conductivity, permittivity, permeability and thickness. For significant absorption of the radiation by the shield, the shield should have electric and/or magnetic dipoles which interact with the electromagnetic fields in the radiation. Electric dipoles will be provided by materials that have a high dielectric constant. Magnetic dipoles will be provided by materials that have a high value of magnetic permeability. Further, the absorption loss is proportional to the thickness of the shield. Electromagnetic radiation at high frequencies penetrates only the near surface region of an electric conductor. This is known as the skin effect. The electric field of a plane wave penetrating a conductor drops exponentially with increasing depth into the conductor.

Dielectric constant is the ratio of the permittivity of a substance to the permittivity of free space. The permittivity represents how difficult it is for the field to propagate inside a medium due to the response of the medium to the field.

Shielding Effectiveness:

Shielding effectiveness is defined as the ratio between an electromagnetic signal’s intensity before shielding (Eo) and its intensity after shielding (Es). Shielding Effectiveness is measured in dB.


Every 20 dB increase in SE represents a tenfold reduction in EM leakage through a shield.

You must have noticed that a radio in a conductive enclosure (example a metal jar) looses signal, but a mobile phone doesn’t. This is because the mobile phone has a high dynamic range. A high dynamic range implies that the cell phone antenna can pick up weak and large signals. A good shielding requires anything above 100 dB.

You can calculate the shielding effectiveness here: Shielding Effectiveness Calculator 

Shielding Methods

  • Faraday Cage (Conductive enclosure, best when nested and grounded)
  • Paints containing metal filaments
  • Clothing – custom made that provide EM shielding
  • Jammers (a jammer that is dynamic and emits signals at all radio frequencies should prevent dew attacks)
  • Enclosure made out of Superconducting magnets (works like a charm, but not really a feasible option for everyone)

Nested – Built with layers of material, to increase thickness and hence attenuation.

What makes a reliable shielding? Something that:

  • protects over a broad range of frequencies
  • absorbs or diverts large energy bursts
  • shields against both magnetic and electrical fields
  • opens and closes repeatedly without degrading the shielding effectiveness
  • provides a consistently tight seal
  • Encloses the entire space to be shielded

Note – Anything that leaks water can leak EM waves. 

In case your implanted, metal-foil hats won’t work, as the radiation enters from the face. 

Some of the Shielding Metals:

  • Nickel
  • Copper
  • Aluminium
  • Sliver
  • Brass
  • Bronze
  • Tin
  • Lead
  • Graphite
  • Mu-metal
  • Supermalloy

Supermalloy and mu-metals are good for absorption due to their high permeability, while aluminium, silver and copper are good for reflection due to their high conductivity.

There are plenty of companies manufacturing shielding materials. Do some research, spend some money and build or buy an effective shield.

Also, have a look at this: Scientists show a new way to absorb electromagnetic radiation

An anechoic chamber eliminates all external radio frequencies. It is a specifically designed room that absorbs all electromagnetic waves.





History of Organized Gangstalking


Zersetzung (German; variously translated as decomposition, corrosion, undermining, biodegradation or dissolution) is a psychological warfare technique used to silence dissidents by political repression. It was first devised by the Nazi Germany and later adopted and refined by the Stasi, the East German secret police.

Erich Honecker, East Germany’s communist leader, patented these methods after concluding that ‘soft’ methods of torture were preferable to open forms of persecution. It was realized that psychological harassment was far less likely to be recognised for what it was. Thus, its victims, and their supporters, were less likely to be provoked into active resistance, given that they would often not be aware of the source of their problems or even its exact nature. Zersetzung was designed to leave victims totally unnerved and distressed psychologically, that they wouldn’t have the time and energy for anti-government activism. The inherent nature of deniability of psychological tactics was advantageous to GDR, as they wanted to maintain their international respectability.

UntitledThe practice of repression in Zersetzung comprised extensive and secret methods of control and psychological manipulation. The Stasi used Zersetzung essentially as a means of psychological oppression and persecution. Findings of operational psychology, were formulated into method at the Stasi’s College of Law (Juristische Hochschule der Staatssicherheit, or JHS), and applied to political opponents in an effort to undermine their self-confidence and self-esteem. Operations were designed to intimidate and destabilise them by subjecting them to repeated disappointment. Social undermining by alienation via interfering and disrupting their relationships with others. The Stasi intentionally concealed their role as mastermind of the operations.

Author Jürgen Fuchs was a victim of Zersetzung and wrote about his experience, describing the Stasi’s actions as a ‘psychosocial crime’, and ‘an assault on the human soul’. The tactics were so subtle that vicitims found it hard to decipher that the Stasi was behind their victimization. Many thought they were going mad, some suffered breakdowns and a few killed themselves. There are around 10,000 individuals estimated to have become victims, 5,000 of which have sustained irreversible damage.

Tactics employed under Zersetzung:

  • Breaking into homes and subtly manipulating the contents, in a form of gaslighting – moving furniture, altering the timing of an alarm, removing pictures from walls or replacing one variety of tea with another.
  • Releasing mice or poisonous snakes
  • Property damage, sabotage of cars, purposely incorrect medical treatment
  • Smear campaigns including sending falsified compromising photos or documents to the victim’s family
  • Bugging of private apartments, widespread phone tapping, physical surveillance, and email interception

Zersetzung is still prevalent in Russia and is covered by Luke Harding, the reporter of British newspaper Guardian in his book: Mafia State: How one reporter became an enemy of the brutal new Russia

Luke Harding arrived in Russia in 2007 as a correspondent for Guardian. Within months, mysterious agents from Russia’s Federal Security Service had broken into his flat and began harassing him with insidious techniques.


COINTELPRO, started in 1956, was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting and disrupting American political organizations. The cladestine project required the FBI to expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate the activities of certain movements and political organizations.

The program was exposed in 1971. The FBI used four main methods during COINTELPRO:

Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents.

Psychological warfare: The FBI and police used myriad ‘dirty tricks’ to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong-armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad-jacketing to create suspicion about targeted activists, sometimes with lethal consequences.

Harassment via the legal system: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, investigative interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters.

Illegal force: The FBI conspired with local police departments to threaten dissidents, to conduct illegal break-ins in order to search dissident homes, commit vandalism, assaults, beatings and assassinations. The object was to frighten or eliminate dissidents and disrupt their movements.


(Note – Much of the above is copy, pasted from Wikipedia)