THOUSANDS REPORT TARGETING BY “THE
PROGRAM” WITHIN THE US AND
MILLIONS GLOBALLY – EDUCATE YOURSELF!
What is Happening
Today is NO JOKE!
SURVEILLANCE TECHNOLOGY DEPLOYMENT CURVE
NSA RACKETEERING NETWORK ANALYSIS
BREAKING NEWS BEFORE ANYONE ELSE
Electronic Surveillance in the SURVEILLANCE STATE
Above is one of many images from a Google Search
Note that the “Domestic Terrorist” label, or “Person of Interest” in many cases, is first attached to justify the surveillance, to include little known nonconsensual use of patented, psychophysical technology, of any and everyone. Reportedly, these types of targeting focus originate from state-of-the-art counter-terrorism divisions, two in each state nationwide, Federal, state, and local unified with military technology.
WHAT EXACTLY IS ELECTRONIC SURVEILLANCE?
PRESIDENTIAL COMMITTEE APPROVES “MILITARY INDUSTRIAL COMPLEX” TESTING OF ENERGY WEAPONS, ETC., ON THE CIVILIAN POPULACE
THE QUESTION THEN BECOMES,
WHO OWNS BOTH &
THE MILITARY INDUSTRIAL COMPLEX?
MILITARY INDUSTRIAL COMPLEX EX-AGENTS
TEN MODERN METHODS OF MIND CONTROL
The FBI, COINTELPRO,
and Project Pedophile
In today’s COINTEL Program, one of the FBI’s favorite soft kill tactics is to label targeted individuals as pedophiles, rapists, sexual deviants or “mentally unstable” in order to isolate and destroy them
In actuality, the FBI re-named the program, gave it additional veneers of security classification(s), and it still continues today, albeit with the assistance of advanced technology and the cooperation of the NSA and DHS.
The goal of today’s COINTELPRO is in part based on what are referred to as the 5 D’s by the United Kingdom’s General Communications Headquarters (GCHQ). The 5 D’s are Deny, Deceive, Disrupt, Degrade, and inevitably Destroy the target.
Well who are the targets one might logically ask next?
If one looks at potential threats through the eyes of the federal government, they will soon discover that NRA members, returning veterans, activists, whistle-blowers, watch-dog bloggers, and investigative journalists are lumped in with the likes of al Qaeda and ISIS operatives. In many cases these “domestic threats” are considered to be more of a risk than actual terrorists.
Why one may ask?
Well, because there are tens of thousands more innocent Americans than there are real terrorists, it keeps federal budgets plump and fluffy, whilst simultaneously allowing for asset seizure under (false) premises. Additionally, it appears as though Americans with a strong moral compass are a threat to the status quo, to the corrupt power structure.
So what is one of the FBI’s primary operational tools to Deny, Deceive, Disrupt, Degrade, and inevitably Destroy the targeted individual?
What I refer to as “Project Pedophile.”
The FBI, patterning their operations in part after the East German Stasi’s Zersetzung operations and GCHQ’s 5D strategy spend hundreds of millions of dollars going after soft targets – innocent Americans, who were never involved in any criminal activity. The FBI uses a 5D/Zersetzung combinatory strategy in order to isolate, potentially radicalize and/or destroy the targeted individual.
In street parlance this is referred to as “Gang Stalking” since civilian hirees are often utilized for this sadistic and cruel work.
What better way to isolate an individual than accuse him or her of violent crimes of moral turpitude against helpless people – such as children. The FBI’s favorite 5D/Zersetzung Soft Kill tactic is to label the targeted individual as a pedophile, rapist or sexual deviant to his or her friends, family, colleagues and co-workers.
That is all that is necessary. Let’s face it. If someone from law enforcement (whom we should be able to trust) approached you or I with a bona fide charge that one of our friends or family members was a pedophile, how would we react? I know that I would avoid the individual at all costs. That serves to immediately isolate the targeted individual.
The FBI and DHS have two sets of records (at least). They maintain an internal grouping of records with the individuals’ actual personal and biographical information, medical history, financial and academic records, etc. These are reviewed by the FBI’s in-house psychologists and are utilized as part of their Psychological Operations (PSYOPS) targeting protocol. The “higher” level the target, the more individuals, man-hours, harassment and isolation they are set up for.
But then the FBI also have the false records with fabricated criminal backgrounds which they have so diligently worked to create for the targets of their 5D/Zersetzung operations – a.k.a. COINTEL Program.
The bogus records and false information are relayed to state, county and local law enforcement agencies, in addition to foreign governments, should the targeted individual travel. The FBI will also infuse the bogus criminal records with factual data-bytes from the individuals’ personal history in order to “build” a more “convincing” and “realistic” case against their targets.
Examples: “Tommy Target was an altar boy at a church where a priest once molested children four decades ago, even though Tommy Target was never a victim himself.” This translates to “Tommy Target was a victim of pedophilia at a very young age, hates children and is now engaged in crimes of moral turpitude with children.”
“Susie Subversive, a passive Greenpeace activist volunteers at an animal shelter on weekends and wants to become a veterinarian.” This translates to “Susie Subversive has an unnatural attraction to large canines, is involved in bestiality and trolls websites depicting abnormal human-animal interactions in her spare time.”
I refer to this as “creating the narrative.” The disinformation created by the FBI and fed to the targeted individuals’ contacts is tailored to the information recipients, and in many cases is based on some factual aspects regarding the target’s actual lifestyle in order to make the false background more believable. “Tommy Target” was an altar boy at a church where a priest was defrocked for inappropriate activity with young males and “Susie Subversive” does indeed spend a lot of time with animals.
If the target’s neighbors have young boys, then the neighbors are told that the target likes male toddlers. If the target’s landlord is a seventy-something year-old widower, then the target is labelled as a sexual deviant who has an unhealthy interest in senior citizens.
Like disinformation will also be relayed to all of the commercial locations the target frequents in order to compel his/her contacts at those locations to “cooperate with the authorities in keeping the community safe.”
But what about witnesses and testimony? The FBI will access court records and speak to family members under the guise of an “official investigation.” Your ex-wife wasn’t happy with her divorce settlement, or maybe your ex-partner has an axe to grind over a failed business two decades ago. The FBI doesn’t care. Those people are approached, coerced, cajoled and compensated in order to give “evidence” and “testimony” which lends credence to, and neatly collaborates with the false narrative the FBI has created for the targeted individual.
Ready for the kicker? This fabricated criminal background is what gets passed around to non-federal law enforcement agencies through regional data fusion centers, and to foreign governments if one travels. And yes, the FBI will also makes sure that the bogus information is also fused with your passport and travel records held by the Department of State.
Deny, Deceive, Disrupt, Degrade and Destroy. Ain’t that special.
Oh but the FBI is not done yet. They will create bogus social networking accounts, such as Facebook, in the targeted individual’s name, post his or her picture, link them to old friends and then friend him or her with young children or German Sheperds in the case of Susie Subversive. This occurs after the Facebook account has been directly linked to, and verified through the target’s email account – which they also hacked. In turn, the bogus social networking account(s) will be paraded to neighbors, family, colleagues and at commercial locations the targeted individual frequents, by the FBI, DHS and their civilian entourage.
The FBI’s DITU (Data Interception Technology Unit), and the NSA may work together on these targeting and harassment protocols, especially since the NSA’s TAO (Tailored Access Operations) has better ability to scoop up all of a targeted individual’s communications than the FBI. U.S. Cyber-command, based at Fort Meade along with the NSA, may also be involved in this activity targeting innocent Americans
If one goes on-line and reads blog entries, watches YouTube videos or reviews past allegations against individuals who are considered politically outspoken, one of the most common threads in all of their stories are that they are either accused of pedophilia, child pornography or mental instability. The mental health accusations were a tactic used by Stalin in Soviet Russia, who institutionalized anyone he considered to be a threat.
The movie “Kill the Messenger,” which describes how journalist Gary Webb became a targeted individual provides for a peek behind the curtain into the FBI’s “Project Pedophile” operation. While another agency was involved in Webb’s targeting, the FBI’s 5d/Zersetzung combinatory strategy is accurately depicted in this movie.
I believe that there are decent FBI, DHS and NSA employees who really are focused on protecting the general population and who want no part of the FBI’s extra-judicial COINTEL Program.
Many of these employees are not on a need-to-know basis, and secondly since these ops are so illegal and unconstitutional, they are compartmentalized. Thirdly, if any of those belonging to the honest cadre of federal employees were to step forward, they too would become targets themselves, and would be thrust into the media limelight while their respective agencies trumpeted buzzwords and catch-phrases such as “pedophile, sexual deviant” and of course “mentally unstable.”
I am always careful to emphasize that most state and local law enforcement personnel are decent people and deserve our respect. It is not their fault that the FBI, in conjunction with the NSA and DHS, are filling regional data fusion center databases and networks with terabytes of disinformation.
Look at it this way: the FBI is abusing its power and is engaged in outrageous government conduct and cruel and unusual punishment. They are jerking around local and state law enforcement, traumatizing the neighbors, landlords, family members, friends and colleagues of the targeted individuals, are methodically terrorizing innocent Americans, and bloating information systems vital to our national security with disinformation in order to meet their agenda, no matter how immoral and treasonous it might be.
THE DANGER OF ABUSE OF CONSTITUTIONAL RIGHTS
PERSONAL TARGETING EXAMPLE
It is difficult to tell exactly what this operation has told, for example, people at the gym about me, and many others in my community, to include distant family, friends, but the unreasonable and horrific hatred towards me would be extremely bizarre if I did not understand the structure of how it works. Proven tactics of discrediting, intimidation, threats are key for mobilization.
Believe it or not, these operations track and monitor specific targets around the clock and anyone around the target is then used or reportedly hired. Someone in the target’s vicinity can be effortlessly beamed negative influence by technology which can remotely control anyone, no matter who you are and especially if unaware of the patented capability.
“We can’t let you expose this program,” the mantra by the drone communication system.
The individuals they have hired and placed around me are actually programmed to believe that I am singlehandedly exposing the truth and a great threat. The fact is, thousands of people are working nationwide and all over the world exposing what is happening today. The list includes high-level activist such as once NSA personnel, ex-military, law enforcement, include FBI, etc. But those around me want to pretend I am on a sole mission for justification to continue to torture me and continued threats of worse. No one should ever be afraid or frightened out of a rightful, intelligent, battle for their God given life.
TWO NSA WHISTLEBLOWERS
As I go about my day, people have always, all my life, everywhere, responded positively towards me.
This fact is this reality is in conflict to what these operations are trying to achieve. The goal is to implant something about the victim in those they contact and then reinforce it by beamed manipulation and influence technology just in case they forget they are supposed to hate you or assist in the mission for them. This program is not above technological influence and intense programming using anyone to achieve the goal, also reported by many targets, and ex-insiders of this program.
The hope is to use others by remote control. The goal is for no official accountability of this monstrosity, using mind invasive technology and the programming done without the leadership, and those at the helm of systems and devices never leaving the high-tech operation center building or reportedly, factually overseeing and spearheading the effort from neighboring locations as part of outsourced Organized Stalking. Drones with psychotronic technology, mind reading, subliminal influence, etc. continue to step up to the plate with 30,000 approved for US skies by Congress.
What is the key to the relentless compliments all day long or beamed degradation? It is a high-tech good cop / bad cop mentality. I mean really, I am not vain at all and don’t need to be complimented and compliments do nothing for me and especially by this corrupt targeting program. In reality, this is part of the game plan and key in psychological operations.
For example, they will say nice car over and over again right before using one of the remotely controlled puppets then sent to damage and destroy a car. This happened once right before bleach was thrown on a convertible top.
I also have witnessed a lot of jealousy beamed around targets and for no valid reason. The fact is these operations fully understand the PSYOPS of, and the power of influencing someone to jealousy by first, believe it or not, scanning them and their thoughts, then by zeroing in on whatever insecurity a person has, then playing on it. And we are talking typically loving individuals. This is why this program and the technology must be exposed and why it is horrendously wrong.
As Lt. Kenda (Investigation Discover) said, and as these operation know, “Jealousy causes people to move forward hatefully and in a maniacal way.”
As a result it is a helpful, influenced emotion by these operations.
These beyond vicious operations of which thousands can attest, know it can, will, and are motivating people to do horrific things. On a personal level, I know this all too well. This is how I got into the program.
The fact is anyone exposing something the government does not want known, are labeled as “Domestic Terrorist.” This is for simply fighting for their lives, again, rightfully, by exposure.
Get the picture?
It is no telling what an Islamic woman had been programmed or perhaps may have even told after an out of the blue, unfounded malicious attack, was directed at me one day which stunned me with, and had me wondering what motivated her. I did not know her. Perhaps she was motivated by the notion that she would be left alone, likely targeted herself, or possibly can stay in the USA as an immigrant if she did whatever requested. Many people are promised various things to include hiring for pay. On one report, recruits can earn $18 an hour.
THE GUARDIAN – MOSLEMS COMMUNITY REPORTEDLY HEAVILY TARGETED
ANOTHER PERSONAL EXAMPLE – THE ONGOING TERRORIST LYE IN THE FACE THEME
After an appointment, I am heading to my car in the parking lot. It’s a beautiful day, and I speak to everyone as I leave. A man walks by and I say Hi. Instead of a simple Hi back, he instead says “I am just trying to get over that pretty face.” I say thank you, and continue walking. He then says, “You won’t have it for long!”
In the ongoing search for fear, the terrorist stalking team are grasping at straws. In reality, they are confused. What they are after is not physical nor material things, i.e., threats to damage cars, residence, etc., at all. In their mental programming, monstrous blindness, what they want destroyed is what is inside of human beings courageously taking a rightful stand today. It is not found in appearance or objects and it is not superficial. It is the location deep within where faith, trust, determination and love results actually creates courage. When everything fades, it remains eternally in your soul.
These ego-driven, narcissist fearmongers, are completely out of touch with reality and believe that evil, obviously empowering them and the hideous covert threats, of lye in the face, is the key to silencing.
He actually looked like the Federal Agent that tried to have me involuntarily committed in 2010, as I left the VA hospital, and failed after I told him I was going to write books about what is happening to me.
MODERNIZED COINTELPRO PSYCHOLOGICAL OPERATION TACTICS INCLUDE ACTING ON DEATH AND DESTRUCTION THREATS
AMAZON AUTHOR’S PAGE
ONGOING NONCONSENSUAL HUMAN EXPERIMENTATION
Cybernetic “Hive Mind” population mental control, DOD “Voice of God,” aka Synthetic Telepathy and Artificial Intelligence (AI) testing for the destruction of human individuality.
DOCUDRAMA FREE WITH ALLOWING ADVERTISEMENT
OR FREE TO AMAZON PRIME MEMBERS
FREE ON VIMEO OR YOUTUBE
More from XKeyscore below
SNOWDEN ACKNOWLEDGE TARGETED AMERICAN’S KILL LIST
COVERT STALKING AMERICA NATIONAL SECURITY RACKETEERING
THE DEEP STATE – GANG STALKING AND ZERSETZUNG
FBI AND NSA OUTSOURCE THEIR HARASSMENT OF TARGETED INDIVIDUALS