“The very absence of the freedom to criticize against your own or any other government is all the more a reason to loudly shout-out for democracy! If that is wrong, Drew boldly went on, then I would rather be wrong than to be numbered among the majority of the so-called righteous people whose only mandate seems to be controlling people.
If a government is against its people expressing themselves, then that government is obviously hiding something criminal from its people and the world, and it is therefore afraid of being exposed and losing whatever power it has.” Excerpt ― Andrew James Pritchard,” Circle In the Sand
MASSACRE: ELECTRONIC STALKING AND MIND
CONTROL IN THE UNITED STATES OF AMERICA
Excerpted from originator Max H. Williams’ blog
(Published by Rudy Andria on June 13th, 2011 with permission of the author)
The world is learning that in the last half of the twentieth century, scientists developed a device/method that allowed them to locate, focus on, and lock onto a person’s brain by remote to manipulate that person’s thoughts and thus his actions. Mind control assaults now loom as one of the main challenges to human rights in the 21st century. The targeted person often never discovers that he has become a mind control victim, and he ends up hurting others, taking his own life, or simply becoming another “Alzheimer” statistic. This paper discusses some of the elements of what I call electronic stalking and mind control (ESMC). I am one of the targeted individuals (TIs) of those activities.
Organized stalking on the ground often accompanies the remote-operated electronic and mind control harassment. The on-ground stalking entails a variety of criminal acts committed on the victim, including monitoring his location on foot and in a vehicle, covertly entering his domicile, tampering with his food, introducing gases and odors into his dwelling, harassing him in his workplace, vandalizing his vehicle and other property, and strangers making rude signals and engaging in rude behavior with him wherever he goes.
However, victims of organized stalking are not always victims of electronic and mind control effects. Likewise, targets of remote-operated electronic stalking and mind control are not always physically stalked. This paper deals mainly with electronic and mind control activities.
In The Silent Massacre, I discuss my particular case, inform readers of what I know for certain about the ESMC, and speculate about other facets of it. Targeted individuals will readily identify with what I talk about in this paper. They understand the veracity of my descriptions of the effects of electronic and mind control attacks, which to others read like science fiction. This paper is written principally for those victims. However, readers who are not TIs but who are intellectually curious about electronic and mind control assault will learn much about the sick attack on hundreds of thousands, perhaps millions of targets, that also indirectly affects everybody in those targets’ lives.
The human resources and the enormous cost required to carry out electronic stalking and mind control, re-enforced in many cases by organized stalking, almost certainly limit its use to governments. Only governments can mobilize the enormous outlay of funds and successfully camouflage the use of those funds. Only governments have the sophisticated, highly-classified equipment and computers required for electronic abuse and mind control. Only governments can train in secrecy the cadre of handlers who administer the electronic assault and mind control activities, using deception and psychology. The intelligence community in the United States operates with an almost limitless secret budget without Congressional oversight.
Having stated that, I recognize that the secret device(s) and method(s), after decades of usage, may have been purloined by those involved and passed on to other entities. It is also possible that other scientists discovered the device(s) and method(s) either collaterally or later independently. The effort from many agencies went into the development of electronic stalking and mind control. With so many pure and applied scientists, social scientists, CIA/military propagandists, intelligence agents, high-ranking government officials, and medical personnel involved in the development, the secret could have been stolen and used for many originally-unintended purposes.
Nevertheless, no non-government entity could carry out electronic stalking without government knowledge of it. U.S. Government intelligence and military units continually scan the airwaves for suspicious radio frequencies. Thus, even mega-corporations, businesses, and other groups would not be able to carry out electronic assault and mind control in secrecy unless they did so under cover of the government and with government protection. Several countries, including the United States of America, have experimented with directed energy weaponry (DEW) and mind control for many years. Once-secret documents obtained through the Freedom of Information Act prove that the CIA and other elements of the intelligence community have electronically targeted American citizens without their knowledge and consent for almost three-quarters of a century.
Fortunately for high-tech targets, the internet brings together victims of electronic torture and mind control from all conceivable backgrounds. Race and ethnicity, color, gender, religion, politics, philosophical views, and all other human characteristics and thought become insignificant as targets unite to do battle with their unseen enemies. The internet provides a link among the many targets of electronic stalking and mind control. Working together, we shall eventually identify the devices and methods used in the remote torture, learn the identity of the perpetrators, and bring the cowardly perpetrators to justice.
The perpetrators also recognize the value of the Internet; consequently, they fill the internet with a massive amount of misinformation on electronic stalking and mind control activities and work relentlessly toward curtailing targets’ use of the internet. The government’s supercomputer system, called Echelon, sweeps the internet and monitors our phone calls, looking for any signs of unrest against the status quo in the name of “War on Terrorism.”
In the following chapters, I often use several terms concerning the ESMC. I shall define briefly three of those terms. Many targets use the term “perpetrator,” or perp, in a generic sense to refer to all of the persons involved in electronic stalking and mind control. I prefer to differentiate between the perps and the other assailants.
Powerbrokers or perpetrators (perps) refers to the group that sponsors the ESMC. That group probably represents one or more of the following:
(1) national law enforcement and intelligence agencies or a coalition of those entities, which operate under the executive branch of the U. S. Government;
(2) a Radical Right or other so-called civic organization or PAC powerful enough to command the support and protection of the executive branches of all levels of government; or
(3) a foreign power, working with the knowledge and acquiescence of the U. S. Government or a group in the U.S. that works for that foreign government.
Handlers work for the powerbrokers in actually employing the still-secret device(s) to carry out the torture and mind control on targets by remote.
Accomplices support the handlers by engaging in on-site organized stalking, spreading rumors, and interfering with the targets’ communications and their daily lives.
The handlers and their accomplices seek to neutralize TIs in any possible way. Interfering with the targets’ ability to communicate aids the handlers in neutralizing the targets. My handlers, who have had access to my computer for years, tried their best to prevent my writing this paper. They especially interfered with the sections dealing with the perpetrators and the psychiatrists by continually deleting my text, keeping me from saving the text to the computer, causing countless other mechanical problems, and distracting me with their voice-to-skull telepathy (more about that later). But they failed to silence me. Their downfall will come from public awareness. I shall do my part to educate the public.
All targets of electronic stalking and mind control can remember when they first realized that they had been targeted. Although it is now obvious that I had been targeted since at least the mid-1970s and very probably even from the early 1960s, I did not discover it until December 2005, when my assailants, or handlers, started bombarding me with electrical-like jolts, strong vibrations, and other physical torture. The first electronic vibrations struck me with such force that I could hardly stand on my feet. Only a few days later, I began hearing voices from unseen speakers. Only I could hear those voices.
I gradually learned that the physical electronic effects, although annoying and often painful, were simply used to “soften” or “sensitize” or “pre-condition” me for the real objective – mind control. I later learned that victims are normally targeted for years before they finally realize it. Some targets suffer physical attacks for long periods and visit doctors frequently without realizing that their symptoms are not natural consequences. Other targets die, sometimes probably from the consequences of their torture, without ever having discovered that they were targeted.
Four days after the electronic attack, the handlers began “talking” to me subliminally through my brain. I later discovered that TIs call that communication voice-to-skull or V2K. It is also sometimes called “synthetic telepathy, microwave hearing,” or “subliminal communication.” Of course, by design, only the victim can hear the talking. At the time that the ESMC hurled me into reality, I was sixty-eight years old and in exceptional physical and mental health. I knew full well that I was not delusional.
The voices first occurred as I drove in Texas near the Mexican border. The vehicle radio was not on. At first, the voices sounded like they came from the door panel on the driver’s side. I thought that someone for some reason had perhaps planted a bug in the door. I later learned that targets can be located using their cell phones. However, at that time, I did not use a cell phone. When I reached Baton Rouge, Louisiana, I sought out a private detective who did a bug sweep on my vehicle without finding anything. At that time, the voices that seemed to come from the vehicle were very weak and scarcely “audible.”
Shortly after visiting the private detective, I figured out that the voices were not coming from the vehicle but from my own body. Having had much dental work performed overseas, I suspected that a bug might be hidden in a tooth. A few days later, I went to a dentist and requested that he take full x-rays of my teeth and mouth. He saw nothing unusual in the x-rays. I did not either at the time, as I was looking for a clearly visible, well-defined object; however, later, in May of 2009, I found those same x-rays and looked at them very closely. In the roof of my mouth were two tiny specks of what looked to be the same metallic substance used for fillings. In my gums was a very slender, light-colored, cylindrical-shaped sliver of some object. Those objects are still unidentified, as I can get no doctor’s order to examine more closely those specks.
The first few months of electronic and mind control attacks threw me into a state of confusion. I was completely disoriented, as I could not understand what was happening. I later discovered that all targets go through that stage of initial bewilderment without having anywhere to turn for help.
As a historian and former government employee, I understand the value of documentation. Thus, on the very day that the electronic effects first pounded me, I started recording a detailed journal in which I recount my experiences and my thoughts concerning them. I later realized that my handlers could utilize my journal as a written record of the effects of their torture, could adjust their effects on my mind and body accordingly, and could circulate a written copy of my journal among themselves. Despite that, I felt that it was more important to keep a record of those occurrences than to attempt to shield myself by not keeping it. The journal today comprises nine volumes and well over a thousand pages of single-spaced typescript.
I do not yet know how the perpetrators of the electronic and mind control assault “hooked” my brain by remote; however, I suspect that I was implanted with a microchip or several microchips over the years. I have had many inoculations, much dental work, and several minor medical procedures performed in various locations. Locating the microchips is a major problem, for they can be inserted in any part of the body, either only slightly below the surface of the skin or very deep into the muscle tissue. I have determined that there are probably nineteen or twenty locations on and in my body where microchips could have been implanted.
Not being able to pin down the location makes finding the devices much more difficult. In addition, if doctors know that a victim wants an x-ray, CT Scan, or MRI to look for a microchip, they will not write orders for those searches. In fact, they will ordinarily advise the authorities of your purpose in wanting those pictures, in effect suggesting that you are paranoid schizophrenic.
As the reader will later see, whatever method was used to “hook” my brain had been employed in my case perhaps by the early- or mid-1970s and no later than the mid-1980s. More recently, I have recalled conditions and events that indicate that I could have been targeted even in the early 1960s. If the latter date proves correct, it would probably implicate the military doctors and other military medical personnel who gave me shots and inoculations when I served in the Active Army Reserves in 1961. I used to wonder how our U.S. rescue forces were able to locate lost servicemen who had become separated from their units during a battle. The capability of locating those disoriented troops suggests that all servicemen are routinely microchipped upon entry.
Theories of Methods Used in Electronic Surveillance Mind Control (ESMC)
We know that electronic and mind control assault operates by remote, but we know little about its delivery system. The delivery has to be either satellite-driven, land-based, or a combination of the two. The debate about which one it is goes on. Likewise, there is still some question about whether the delivery system requires a device implanted in the human body or can be delivered without that implanted device.
“Remote” means that some object is used to make contact with the human body over a distance through the air. Whatever is beamed into the body does not waft aimlessly through space but follows a line of trajectory or a frequency. Anything that makes a sound or a movement creates a frequency. There are thousands, probably millions, of frequencies. Almost anything today can be controlled by remote using particular radio frequencies.
Today remote-controlled objects are also used in guiding satellites and unmanned space ships, sending and operating military spy drones, changing TV functions, opening garage doors, turning on light switches, and working almost any other motorized or electrical object. It would be difficult today for an American to live without remote devices.
Electromagnetism may play a role in the targeting. A field of electromagnetism seems to envelop the target’s surroundings. In my case, it appears to cover my house and the pastures and fields immediately around it, as whenever I am outside, the handlers’ voices, or V2K, come through stronger and clearer. Once again, we do not know whether that electromagnetic field is projected by satellite, from a land site, or from a hidden device in or near the victim’s house. Notwithstanding, what if there were some type of device that could make contact with that electromagnetic field that surrounds the target and then operates within that field to attack us along with our particular brain frequencies? If that were true, the distance would be no object and a person could be pinpointed among several nearby people for electronic assault.
Satellites now possess amazing capabilities, all performed by remote, and they may very well be utilized in electronic assaults and mind control. In a 2003 article called Shocking Menace of Satellite Surveillance, John Fleming wrote about the use of satellites in ESMC assault. Discussing the realities of satellite-driven ESMC, Fleming said: “The victim’s movements will be known, his conversations heard, his thoughts picked clean, and his whole life subjected to bogus moralizing, should his tormentor diabolically use the information gained. A sadist could harass his target with sound bites, or audio messages, directly broadcast into his room; with physical assault with a laser; with subliminal audio messages that disturb his sleep or manipulate persons around him into saying something that emotionally distresses him . . . .”
The satellite-guided GPS almost certainly figures somehow in the electronic assault and mind control activities. Programs such as Google Earth can locate and zoom in on houses and other objects on maps. That a victim can be targeted regardless of his location and movement argues that a satellite is very likely involved. For a satellite to be able to follow and pinpoint the target wherever he goes, however, probably requires an object, a substance, or a special condition in the target’s body or, as suggested above, a device that can operate within and upon the electromagnetic field around the target. The voices that many targets hear may be piggybacked over the GPS into that electromagnetic field. Targets know that the intelligence community and other agencies possess through-the-wall surveillance capability.
If satellites are used, distance is no object. Our torture could be carried out from other countries just as easily as from the United States. China, India, Israel, Russia, and other countries possess that capability. Consider the use of drones in warfare. Today (November 2009), the United States often sends drones, or unidentified aerial vehicles (UAVs), to strike targets in Afghanistan and Pakistan. Forward observers identify the target, get permission to call in, and then communicate with the drone operators. Those drones are guided by computer software by remote from facilities in the United States, notably Fort Meade, Maryland, from thousands of miles away through the GPS with pinpoint precision.
The use of satellites, however, does not prove that the attacks come from a great distance. Satellites can also be used along with the GPS from nearby. Handlers who live near targets can utilize satellites and the satellite-driven GPS, using the same devices and methods, just as easily as handlers who operate thousands of miles away. Information concerning weaponry capable of being used by satellite for physical and neurological torture is purposely vague about distances. Eventually, we shall know from what range our handlers operate. It will probably vary from case to case. Many targets believe that our electronic harassment comes from U. S. Government facilities near Fairbanks, Alaska called High-Frequency Active Auroral Research Program, or simply HAARP.
This paper does not explore in depth the methods used to zero in on a person’s body and mind by remote. There are many schools of thought on that subject. Here are some of them.
One theory believes that one’s voice can be recorded, transferred to a computer, and the computer then used to locate the particular voice and lock onto that voice’s brain. Experiments show that that can indeed be done. Voices give off distinct vibrations that are as peculiar to a person as his fingerprints and DNA. One day when the handlers were vibrating me mercilessly, I tensed my throat, and the vibrations stopped.
That caused me to remember an incident that occurred when I served in Africa in the 1980s. One day while working in my office, the secretary of the embassy political section, the office that serves as a front for our CIA agents, called me to ask some questions that anyone could have answered. I hardly knew the caller; thus, I instantly realized that the real purpose of her call was to record my voice…
Ex-FBI agent, now Targeted
LINK TO ROOT CAUSES OF POLICE / FBI BRUTALITY
WHAT IS THE JOB REQUIREMENT
FOR THIS PROGRAM AND THE POSITION?
NOTE: Biotechnology, for those aware of psychophysical technology, i.e., mind invasive and beamed energy weapon systems and devices are in full use today, says it ALL!
Thanks, Kristen Conklin, for this information. She is a researcher and a target who was sent the job requirements on LINKEDIN. Most already know who is FACTUALLY pulling the strings, and others pretend they don’t!
Ask yourself why?
At this moment, I personally am under a beamed attack focused on my heart. This can happen typically from a neighboring location, such as Ozzie Nelson’s where several recruits can be seen entering and approved military surveillance budget paying the rent!
LINKEDIN JOB SEARCH RESULTS AND
COMMENTS BY TARGETED KRISTEN CONKLIN
POSTED ON FEB 2019 ON FACEBOOK
Industry: Law Enforcement, Biotechnology, Chemical…
“I have been invited to apply for a job through LinkedIn. I found this invitation interesting because people who are targeted by weapons in this industry typically have no idea where to go and ask for help. I hope this post gives people direction. This invitation comes from the FBI located in Houston, Texas. Please read the job description below for what credentials the agency there is looking for. My resume is geared towards nuclear power plants, lighting controls, water systems, and commercial and residential construction engineering. I would love to take the job at this time, but my body is controlled by the type of weapon that I would be seeking to stop if I worked there.”
This invitation comes from the FBI located in Houston, Texas.
Please read the job description below for what credentials the agency there is looking for. My resume is geared towards nuclear power plants, lighting controls, water systems, and commercial and residential construction engineering. I would love to take the job at this time, but my body is controlled by the type of weapon that I would be seeking to stop if I worked there.
As an FBI Special Agent with expertise in Science, Technology, Engineering and Math (STEM) fields, you’ll have a career like no other. Your STEM background provides skillsets in areas the FBI needs most. To keep pace with evolving threats, we need Special Agents who are logical thinkers and experienced in network security, computer science, software engineering, mathematical formulation, and technology. And as a Special Agent, you will be integrated into all of the different areas in which we work.
Technology permeates every aspect of what we do, whether it’s counterterrorism, criminal investigations or traditional cyberattacks. Investigating technology and computer-based cybercrimes (website hacks, intrusions, data theft, ransomware, and other attacks) make up some of our top priorities.
Whether it’s a counterterrorism or counterintelligence investigation, your skills could make the difference in catching the bad guy. You’ll also have opportunities to become a Technically Trained Agent or part of our Computer Analysis Response Teams — our most elite teams that provide technological services to meet unique investigative needs in operational environments.
You can expect continued specialized training once onboard and you will work on some of the Bureau’s most complex cases. The scope and scale of our investigations provide unique challenges, unlike anything you could work on in the private sector. Your ultimate mission: to protect the American people and uphold the Constitution of the United States.
Being a Special Agent can be a lifelong career of uncommon days and amazing experiences. What you’ll need to succeed:
Exceptional problem-solving and analytical skills. A deep understanding of the deployment, administration, and support of information and computing infrastructure.
Ability to communicate clearly and effectively with both technical and non-technical colleagues and stakeholders, both internally and externally. Be detail-oriented, yet keep a strategic focus.
Ability to objectively evaluate information and make sound judgments.
BA/BS degree in information technology, forensic science, computer technology, or similar disciplines. Honesty and integrity must be the foundation of who you are.
Demonstrated technical expertise and problem-solving ability. The drive and commitment to make a difference in the communities you serve.
All applicants are evaluated on core competencies of collaboration, communication, flexibility/adaptability, initiative, interpersonal ability, leadership, organizing/planning, and problem-solving / judgment.
The FBI Special Agent position requires significant commitment and dedication from you and your family, but it’s an experience you will never forget. As a Special Agent, you will join an elite team of people committed to the highest technical and ethical standards. Our team has a mission like no other and our people are sought after as some of the best in their fields.
Be at least 23 years old and not have reached your 37th birthday on appointment.
Must have a bachelor’s degree or master’s degree from a U.S.-accredited college or university.
Have two years of full-time professional work experience (see work experience waiver for exceptions).
Meet the FBI’s Employment Eligibility requirements:[https://www.fbijobs.gov/working-at-FBI/eligibility].
Possess a valid driver’s license with at least six months driving experience.
Meet all FBI physical requirements, be physically fit to complete training at the FBI Academy in Quantico, VA, and maintain a high level of fitness throughout your career.
Commit to serving as a Special Agent for a minimum of three years.
Successfully complete approximately 20 weeks of employment as a Special Agent trainee, while housed at the FBI Academy.
Work a minimum of a 50-hour workweek, which may include odd hours, and be on call 24/7, including holidays and weekends.
Be willing and able to participate in arrests, execute search warrants, raids, and similar assignments.
The FBI is proud to be an Equal Opportunity Employer and all qualified applicants will receive consideration for this vacancy. Except where otherwise provided by law, a selection will be made without regard to, and there will be no discrimination because of color, race, religion, national origin, political affiliation, marital status, parental status, physical or mental disability, genetic information, age, sex, sexual orientation, membership or non-membership in an employee organization, or on the basis of personal favoritism, or any other non-merit factors.
INTELLIHUB – FBI ILLEGAL CYBER HARASSMENT PROGRAM
There is nothing honorable about the covert high-tech targeting originating from highly advanced operation center’s today. If I were not experiencing it personally, I would not believe such covert evil exists and was quietly legalized and this type and style of COINTELPRO targeting documented as being a historical fact.
The fact is, as many know, I am not alone in enduring this horrific monstrous wrong. I continue to post my experiences, after the realization that this is the only way that seems to slow the effort around me by ongoing exposure of these high-tech operations who have banked on the belief that people will not believe numerous and growing numbers of targeted individuals. This is unbelievable with many documenting near-identical experiences in “The Program.” Recognition of what many are reporting as being factual is the last thing this program want. Repetitive exposure may be the only reason I am actually still alive.
This program is successful because of a lack of awareness, knowledge of electromagnetic capabilities and official patents, the strategic discrediting of thousands of victims, and high-level government agencies, and connections, such as the Association of Psychiatry, historically used to report targets instead as having “mass delusions,” strategically. There is an ongoing and very effect agenda in place to create disbelief through twisted and controlled media promotions, gag order silencing, as well as to ensure, again, that even patented technology and abstracts, firmly documenting the capabilities of psycho-physical technology portrayed as unbelievable, nonexistent or not in use in the covert global agenda. The level of such evil at work today is difficult for many to digest.
History proves otherwise related to government’s mass control objectives, as many are awakening to a covert high-tech invasion reality targeting not only individuals but groups, communities and large populations, of such great propensity, that many are beginning to ask:
“Is the US DOD and DOJ Secretly Permitting Military and Law Enforcement Assaults on US Citizens?”
Let me answer this question, based on personal experience and again, the numerous accounts of untold numbers of highly credible targeted human beings, the answer is a resounding **YES!**
By strategically combining specific laws, such as the PATRIOT Act, National Security Letters, EO 12333, DOD Regulation 5240.1.R and specifically the “Exception Clause” of US Code, Title 50, Chapter 32, Section 1520a, authorizing riot/crowd control biological weapon testing for military and law enforcement personnel, nonconsensually on anyone, a high tech covert, land, sea and space-based weapon system, and portable patented devices within a Goliath program has been unleashed and today is contributing to covert horror and terror so massive making US citizen’s targets on America soil with none existent enforcement of Constitutional, Civil or Human Rights.
LEGALIZATION LAWS, OFFICIAL PATENTS, ETC.
“The Program” is materializing as being so ruthless, and inhumane, and manned by desensitized human beings, sitting at the helm after decades-long perfecting, psychophysical weapon systems, that they seem to relish in the capability of the strategic focus of the monstrous powerful for life-destroying, the covert ability.
If even a small portion of FBI quotes on corruption are true as shown in the link below, then murdering those considered expendable, technologically, is not an outrageous concept and surely a capability. This is a concerted advanced technology paradigm. For example, by unleashing psychotronic and weaponized drones equipped with energy weapons is basically cost-free to Federal, state, and local law enforcement agencies operating from high-tech operation centers counterterrorism and fusion. For these specific types of targeting, unified and in cahoots with military personnel, military technology is turned on US citizens as political dissidents in well over 50 operation center’s nationwide, two or three or more in each state as the overseers. Mind invasive technology remains this program’s hideous, best kept secret, as the high-tech capability of brilliant, beamed covert behavior modification ideation continues to advance.
Today, unified efforts of many agencies, Federal, State, and local, use satellites and drone communication systems and portable ground-based equipment to deliver verbal threats, relentless harassment, deafening noise harassment, and propaganda. This includes anything from TV’s/radio’s appearing to operate when switched off through to what the DOD actually calls the “Voices from God” and bogus encounters with “telepathic” aliens are all cons jobs using Neurophone technologies. The effort is too torment, deceive, and (most importantly) again, and again, discredit targets. A major asset is a fact that the “Synthetic Telepathy” system can mimic anyone’s voice as well as automatic computer translations into any language. This is handy when other languages are spoken around a target, or the target speaks another language.
So what is the FBI, etc., really up to today? Historically as shown in the video below, the agenda of the COINTELPRO is well known, documented, and clear and has not changed much historically as a standard operating procedure.
PROJECT MK ULTRA – A 20 YEAR OFFICIAL MIND CONTROL EFFORT AND NONCONSENSUAL HUMAN TESTING PROGRAM
THE MANIFESTO – COINTELPRO: THE FBI’S COVERT ACTION
PROGRAMS AGAINST AMERICAN CITIZENS
MILITARY RADIO FREQUENCY CHIPPING SOLDIERS
NOTE: Law enforcement heavily recruits soldiers from bases)
THE GLOBAL PLAN
PSYCHOTRONIC AND ELECTROMAGNETIC WEAPONS REMOTE CONTROL OF HUMAN NERVOUS SYSTEM
“WHAT IS GANG / ORGANIZED STALKING?”
THE OBEDIENCE TO AUTHORITY DYNAMIC
STANLEY MILGRAM EXPERIMENT
THIS IS YOUR BRAIN ON THE DEPARTMENT OF DEFENSE
INTENTIONALLY “DUMBED DOWN AMERICA”
27 YEAR VETERAN AND SUPERVISOR, EX-FBI AGENT
TED GUNDERSON REPORTS ON GLOBAL EVIL
Gunderson on Gang Stalking – Quoted From Gunderson (Retired FBI agent)
Ted L. Gunderson is not your average targeted individual. He has a storied career of almost three decades as an FBI Chief behind him and also has been involved in media covered cases involving government corruption as a private investigator. His professional opinion on gang stalking (a personal struggle for him after speaking publicly about FBI corruption three decades ago) is posted below:
In this sworn affidavit, Gunderson lays out the anatomy of a government catastrophe. This is the origin of American totalitarianism. Basically, the DOD is using the FBI and CIA as errand boys for a military-led goon squad with a trillion-dollar budget (about half of it classified). All of the actors are funding gang stalking through black-ops. In other words, the government is running rackets on a big level from narcotics and prostitution to human trafficking. His findings of thousands of American victims of government gang stalking are backed by information from active and former members of the Intelligence agencies, criminals informants at all levels in ongoing syndicate crime, and countless victim testimonies…
The Army Reserve, who are the 250,000 plus citizen reservists? Most are firefighters, cops and other civil servants have been converted into the goon squad boys involved in gang stalking. The military has set up shop throughout civilian society and has handpicked the leaders of the American version of the Red Guard. This feeds into the military-industrial complex in a big way. According to Dr. John Hall, most of the gangstalking vehicles in the San Antonio, TX area have plates leading back to defense contractors. We are talking about Boeing Company with its Narus systems that are a domestic version of Echelon used by FBI, NSA, and DARPA. These systems can monitor and data-mine tens of millions of calls instantly, making privacy a quaint idea.
We have embarked on the era of gang stalking also known as an organized stalking government conspiracy, high crimes, and cover-ups in America. Is anybody from the Patriot movement listening? I hope so!
Official confirms what thousands of victims have long known: an evil U.S. shadow government is conducting a covert, taxpayer-funded genocidal purge of American society — while Congress and an apparently entrained Obama administration sleep…
NOW FREE ON VIMEO AND YOUTUBE!
AMAZON DVD PURCHASE
“BIGGER THAN SNOWDEN” WHISTLEBLOWER’S ARCHIVED LINK