HACKED – The High-Tech COINTELPRO Set-up Hope, using Psychophysical Technology Can Be Used Covertly to Silence, Discredit Using Anyone Around Targets. Today it is Science Nonfiction!

NOTE: This blog was corrected on July 29, 2018, after the COINTELPRO targeting operation inserted numerous misspelled words and errors.  Updates and corrections continue as issues continue to evolve.

THINK GLOBAL “PSYCHOLOGICAL ELECTRONIC”

BEAMED TECHNOLOGICAL POLICING!

 

What do the FBI, the DOJ, The Secret Society &

Our Lady Have in Common?

https://www.sign.org/articles/fbi-secret-society-lady-common

 

Why the secret handshake between police and

Freemasons should worry us.

https://www.theguardian.com/commentisfree/2018/jan/02/secret-handshake-police-freemasons

 

Members of the Brotherhood are prepared to:
give one’s life; commit murder; commit acts of sabotage;
betray one’s country to foreign powers; cheat, forge, and blackmail;
corrupt the minds of children; distribute habit-forming drugs;
encourage prostitution; disseminate venereal diseases;
do anything which is likely to cause demoralization of society.
George Orwell – 1984

 

Just how far will the intense technologically fueled discrediting, take-down, silencing effort around specific Human Rights Advocates, whistleblowers, activist, political dissidents, and human guinea pigs go?   And, considering official approval for mind invasive technology use for military and law enforcement, what role does patented mind invasive play around targets for set-ups?

After having a family member and her child briefly staying with me who left February 15, 2019, this official blog detailing ongoing heinous methods for an FBI/LAPD “Set-Up” blog had to be updated.

Trust me when I say this program will try to use ANYONE to silence a target and apparently will go to great lengths, I have learned from past experience.  And, without  a doubt this is a high-tech capability done by using subliminal manipulation and influence patented technology.

I wish I could have helped her longer, and her 8 year old child more as a single parent, who life was unstable after a move to Los Angeles, and not knowing her very well, as my  ex-husband’s family, but after consulting with my daughters, she will land on her feet, with a Master’s Degree, in film.  I wish her the best.

However, the bottom line, with me is that under the circumstances, I could not afford for her to be used as a weapon against me in a massive, ongoing takedown, and relentless effort and official discrediting campaign around me.

If this program has consistently attempted to use everyone else, she, I realized was no exception as an adult of 32 years old!

God bless her!

However, the question still remains,  of which needs to be addressed and openly discussed, “Can the advanced technology, in full use today be used to subliminally manipulate and influenced someone against a high level target?  Without a doubt, the capability is backed up as a capability, which is documented by many official mind invasive patents.

In the new high-tech paradigm, the fact is, Post 9/11 approval for use of psychophysical technology for military, federal, state and local police department  operations, today unified under one umbrella, and now at the helm of highly perfected systems and devices it can happen.  And after 14 years I have seen it all.

A new method of policing has evolved within official, 24/7 targeting missions, which can be accomplished by beamed influence, and much more, and it done without leaving the state-of-the-art operation center building, two to three in each state across the USA using weaponized microwaves and much, much more.

 

ELECTROMAGNETIC FREQUENCY

MIND CONTROL WEAPONS

LINK:

http://www.thepeoplesvoice.org/TPV3/Voices.php/2011/01/04/electromagnetic-frequency-mind-control-w

 

Naturally discrediting and silencing of anyone exposing the hideous use, immorally unjustly of the technology would not only create questions on the legal ramifications of use by specific agencies using it, but also, undoubtedly would ensue a corrupt hope that the technology remains hidden from public scrutiny and national disgrace.

For example, what are the repercussions of using beamed “Synthetic Telepathy” systems and devices, and other official patents, on someone around a target too fabricate a false reality and false allegations useful for silencing, to include also the patented capability for highly perfected technological hypnosis?

Sadly, reportedly, family and friends or anyone close to the target, can become a major issue if sought to use in this type of high-tech manipulative influence, becoming an unwilling naive patsies within today’s high-tech policing and hope to silence exposure.

This monstrous, high-tech COINTELPRO program is no joke and today is enforced by numerous patented technology.

Below are patented examples:

As exposure continues to snowball, all over the world, understand again and again, this evil program, and technology DECADES perfecting are NO JOKE!!!

 

Screen Shot 2019-02-15 at 10.17.55 PM

 

Synthetic Telepathy

https://lnkd.in/b4Siv-m

DOD “Voice of God”

https://lnkd.in/gK7qBzp

Media Coverage

60 Minutes (CBS News) documentary “Mind Reading”

New Scientist report about the latest V2K weapon – “MEDUSA”CAMS’ response

Military Sources

Bioeffects of Selected Non-Lethal Weapons

Neuroelectric Activity and Analysis in Support of Direct Brainwave to Computer Interface Development

Radiofrequency Radiation Dosimetry Handbook

MKULTRA Subproject 119

Literature Review Papers by American biologist

and Christians Against Mental Slavery member

John McMurtrey M.S.

* NEW * Microwave Vibration and Pulse Effects * NEW *

HTML formatWord formatPDF format

Technological Simulation of Hallucination

PDF formatWord format

Project Bizarre Weapons Implications:  Are Psychiatric Diagnosis, and Microwave Exposure Standards Presumptive?

HTML formatWord format

A Simulated Hallucination Mechanism Compared to Hallucination Brain Response Studies

HTML formatWord format

Inner Voice, Target Tracking, and Behavioral Influence Technologies

HTML formatWord format

Thought Reading Capacity

HTML formatWord format

Physiologic Word Recognition

HTML formatWord format

Remote EEG Discussion

HTML formatWord format

Recording Microwave Hearing Effects

HTML formatWord format

Microwave Bioeffect Congruence With Schizophrenia

HTML formatWord format

Remote Behavioral Influence Technology Evidence

HTML formatWord format

 

“Your worst enemy, he reflected,

was your own nervous system.

At any moment the tension inside

you was liable to translate

itself into some visible symptom.” 

George Orwell – 1984

 

 

Screen Shot 2018-06-05 at 11.24.27 AM

https://patents.justia.com/inventor/hendricus-g-loos

 

“With technical advances private

life came to an end.”

George Orwell – 1984

John McMurtrey’s future research plans

Feasibility Study for Design of a Biocybernetic Communication System

World premier online publication of Pinneo’s

research into technological thought reading

 

On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology

Carole Smith

Hacking The Mind

Carole Smith

Paper accepted for 5th European Symposium on Non-Lethal Weapons, Ettlingen, 11 May 2009

 

UPDATE JANUARY 2019

THE “DOMESTIC TERRORIST” LABEL AND

THE DOMESTIC TERRORISM BILL

CONTINUED FOR 2019

[EXCERPT]

“People have forgotten that in his day, civil rights leader Martin Luther King Jr. was viewed as a domestic terrorist for his acts of civil disobedience, ” Whitehead said. “Under this law, which aims to demonize and criminalize organizations based on their social or political associations with individuals whose unpopular beliefs or anti-government sentiments may be construed as ‘terrorist, ‘ organizations associated with King would be labeled as domestic terrorists and blacklisted. This is about as McCarthyist and un-American as it gets.”

LINK:

https://www.dailypress.com/news/politics/va-general-assembly/dp-nws-politics-domestic-terrorism-2019-bill-20180725-story.html?fbclid=IwAR2dhE3I4NhJO3csYuRXQ4ukeEbXFSVfO9KmdQ5bLOZJU332FOfyPNAuNT4

 

screen shot 2019-01-25 at 12.23.09 am

 

 USA FBI CIPAV COMPUTER HACKING SOFTWARE

https://www.eff.org/deeplinks/2011/04/new-fbi-documents-show-depth-government

 

OFFICIAL COMPUTER-BASED MONITORING (HACKING)  

ELECTRONIC SURVEILLANCE AND ITS EFFECT

https://onlinelibrary.wiley.com/…/j.1559-1816.1993.tb01100.x

My computer had been COMPLETELY HACKED…

After a notification from Google Plus that my account was threatened for complete shut-down, used also for exposing “The Program,” I went through all posts dating back to the beginning of October 2018.  ALL had information I simply did not post which when combined as a whole would leave a negative perception of me by design.  As a rule, I am very careful on Google Plus knowing that my first account was shut-down for community violations of information.

More importantly, when I deleted the negatively inserted information, under the watchful surveillance of my computer, the operation hoping to use it to portray me as looney, immediately put it back.

It appears the COINTELPRO effort around me, had copied my posts, and by following me in real-time, when I deleted it, it cleverly was reinserted short thereafter.

My website and blog have high security alerts on them for this reason, however, at few times, I have forgotten to log out.  The end result is tampering.

 

EXAMPLE OF SETTING UP REGIONAL HACKING UNITS

‘SURVEILLANCE TECHNIQUES’ THROUGH A COMPUTER

 BE BOTH POSITIVE OR NEGATIVE

“Surveillance techniques used by police include remote hacking and placing keylogging software on computers, according to Jonathan Krause, a former analyst and civilian employee in the Metropolitan Police’s child protection unit. Covert forensics involves performing forensic analysis of a suspect’s PC or device without that person’s knowledge.”

FULL LINK:

https://www.zdnet.com/article/police-set-up-regional-hacking-units/

 

screen shot 2019-01-25 at 7.09.51 pm

 

screen shot 2019-01-26 at 8.58.40 am

 

The above emailed messages became an alert that my Google Plus posts had been tampered with.  Connecting a person with terrorist is a very effective method to engineer entrapment.

For the Record, I, Renee Pittman, am not associated with any terrorist group and never have been, but apparently, the COINTELPRO operation believes that the association with Islamic Terrorist, now twice, with the actual creation of a bogus Facebook page in Arabic, revealed below, believes the connection would sabotage efforts of exposure used to save lives.  The second time, another set-up occurred, I was stunned.  This was done by actually planting a memory card inside my residence, with images of those who appeared to be Islamic Terrorist in a terrorist training camp.  I believe that based on phone conversations by a person they new I had an upcoming meeting he was used.

This was a cleverly devised plan of wanting to raid my house based on the thumbnail disk now inside which I had never seen before.  The resulting goal would be the taking down this blog, the website, the Amazon book series, and the Amazon docudrama detailing high-tech harassment and how mind invasive, patented technology is being used.  

I am simply one woman using exposure to fight for my life.  This is the method I chose and I proudly join many others doing the same all over the world.  This is a 14 year operation around me, on a 24/7 mission, plotting, or until the target expires.

http://www.biggerthansnowden.com

Doing a Google search of my name revealed the duplicate Facebook page, likely created by this relentless COINTELPRO operation.  Admittedly, I was shocked to see that  the original Facebook page I created, as Renee Pittman Mitchell (Renee Pittman) now had a duplicate Facebook page in Arabic.  To some it could appear as if I was feeding information to terrorist.

With planting of the small memory card in my house, in April of 2018, the motive was clear.

EXAMPLES OF TWO FACEBOOK PAGES BELOW

BOTH VERSIONS CAME UP IN A GOOGLE SEARCH

 

 ORIGINAL & ARABIC

 

Screen Shot 2018-06-24 at 10.32.02 PM

 

ORIGINAL

 

Screen Shot 2018-06-24 at 10.30.49 PM.png

 

ALSO WHEN TARGETED THIS WAY

THESE OPERATIONS HAVE ALL OF YOUR PASSWORDS  

AND MAKE INSERTIONS FOR NEGATIVE PORTRAYAL. 

Screen Shot 2018-06-24 at 10.29.32 PM

 

WIRED.COM ARTICLE GIVES A REASON,  

WHY THIS TACTIC IS USED.  

REPORTEDLY, THE  FBI TEACHES AGENTS:  

‘MAINSTREAM MUSLIMS ARE ‘VIOLENT, RADICALS’

BECAUSE OF THIS ANY ASSOCIATION IS DAMAGING 

My point is that, if successfully attaching this label, the contrived connection could be a source of destruction of a person’s life when there is factually is no connection whatsoever.

https://www.wired.com/2011/09/fbi-muslims-radical/

 

Screen Shot 2018-06-24 at 10.33.47 PM

 

SIMPLY FIGHTING BACK USING

EXPOSURE GETS YOU LABELED A

DOMESTIC TERRORIST

 

Many social networks answer to government agencies by law.

I could not figure out why the new book cover did not update on Google, for “Covert Technological Murder Pain Ray Beam,” after a while, the connection was clear.  “Covert Technological Murder – Pain Ray Beam” in the Google search engine, now after two years still had not updated to the newer gray cover.   Why?  It is possibly because the updated gray book cover has the targeting agency, the JRIC which is the FBI Joint Resource Intelligence Center, the high-tech counterterrorism division overseeing Los Angeles County, LAPD – RACR and references Military PSYWAR involvement on the cover and also the use of weaponized drones, reported to be used for official beamed subjugation electronic energy torture and the hope to torture specific targets into submission.

The JRIC is the spearheading agency.  It is the FBI counter-terrorism division in Los Angeles County, in the new paradigm, under one umbrella unifying LAPD, Sheriff, etc., etc., etc., and USAF personnel and technology, and reported involvement of a heinously vicious beamed assaults by drones using the military Active Denial System “Pain Ray” beam.

JRIC INFO:

https://archives.fbi.gov/archives/news/stories/2006/august/jric081406

 

NOTE:  THE RED AND WHITE COVER BELOW IS

OUTDATED FOR WELL OVER A YEAR NOW.

 

Screen Shot 2018-09-07 at 11.34.47 PM

 

AND MORE IMPORTANTLY THE PAIN-RAY 

HIGH-TECH SLOW-KILL OPERATION?

 

THE GLOBAL MILITARIZATION OF POLICE IS NO JOKE! 

https://en.wikipedia.org/wiki/Militarization_of_police

** UPDATE **

After over a year of healing from the total hip replacement, 3/3/17, in the ongoing effort using a focused energy weapon beam, as of July 2018, USAF personnel dispatched from the nearby base, in the joint targeting operation with LAPD personnel overseen by JRIC approval are doing what they have been successful at in the past.  This is the continued strategic deterioration of my health.   

The goal of these operations can evolve into an official strategic effort by destroying tissue, organs, and joints, as I continue to report, by beam deterioration then moving on to the next area and ultimately creating a domino effect of health deterioration to the human body.  Knees and other joints, shoulder, hips, hands, etc., are key beam cooking areas, at least for me.  My philosophy is to document everything in my health records, this way if damage occurs there is a record of normal healing and no issues, then if unexplained deterioration erupts, there is a record.  

 

Hip Joint

 

BIG BROTHER IS DOING FAR

MORE THAN WATCHING!

“To the future or to the past, to a time when

thought is free,when men are different

from one another and do not live alone

– to a time when truth exists and

what is done cannot be undone:

From the age of uniformity,

from the age of solitude,

from the age of BIG BROTHER, from

the age of doublethink

– greetings!” 

George Orwell 1984

THIS IS A GLOBAL, RIGHTFUL BATTLE FOR LIVES

EXPOSURE THE WEAPON!

THE RIDICULOUS OFFICIAL ART OF “VICTIM BLAMING”

CAN ALSO BE USED FOR STRATEGIC SILENCING

One thing is certain, these high-level covert targeting operations would prefer that targets simply lay down and take the horrific abuses and destruction of their life, submissive, frightened, and curled up in the fetal position, watched in real-time.

If target’s instead dare, in the game and rightful battle to start effectively exposing the structure of this program and what is happening around them and to thousands,  those spearheading the targeting then cry foul play, as sociopaths and suggest that the information is unpatriotic exposing them although available everywhere.

“VICTIM BLAMING” LAW AND LEGAL DEFINITION

https://definitions.uslegal.com/v/victim-blaming/

Everything in this blog is open literature evidence revealed by untold numbers of targets within the USA and globally.

In reality, that which is factually unpatriotic is the horrendous, beyond malicious, well-hidden, inhumane, ongoing nonconsensual human experimentation, the technology testing and efforts of which, reportedly these twisted operatives will covertly kill to keep hidden. 

As with many targeted, exposure becomes the only tool available for survival of a hideous atrocity and actually the only choice the target has as a method to hopefully save their very lives, and the lives of family members, children, grandchildren, who these operation’s threaten with covert destruction also hoping for fear and control to also use them.

The alchemy is to transmute darkness to light!

COINTELPRO

DENY,

DISRUPT,

DISCREDIT

Michael German is an American retired FBI agent, scholar, and writer. Michael German is a fellow at the Brennan Center for Justice’s Liberty and National Security program.

NOVEMBER 2014 VIDEO BELOW IS A DECLARATION

ON “THE PETE SANTILLI SHOW” OF A SMALL FEW

DEDICATED TO RIGHTFUL EXPOSURE OF THE

HIGHLY SECRET TARGETING PROGRAM

 

As controversy continues to surround many, both negative and positive, for the record…
While I can’t speak for the other’s involved or interviewed in this requested interview of me by Ken Rhoades, the day after Assistant District Attorney, Myron May, went Postal, resulting in the Florida State University, Strozier Library tragedy, my efforts are, and have always been, sincere and honorable.

Screen Shot 2018-06-02 at 11.27.59 PM

 

WHAT WE LEARNED FROM THE MYRON MAY,

TRAGEDY, TARGET’S PLEASE DO NOT GIVE UP  

THE TRUTH WILL ULTIMATELY PREVAIL!

 

UNDERSTAND THAT COINTELPRO tactics has always, historically included discrediting targets through psychological warfare, planting false reports in the media, smearing through forged letters, harassment, wrongful imprisonment, using others, extralegal violence, and assassination. Covert operations under COINTELPRO took place between 1956 and 1971, however, the U.S. Government has used covert operations against domestic political groups since its inception and continues to this day.

Screen Shot 2018-06-02 at 2.25.33 PM

 

Screen Shot 2018-05-27 at 5.42.35 PM

HUFFINGTON POST – MODERNIZED COINTELPRO ON STEROIDS

[EXCERPT]

“Moreover, as FBI general counsel Valerie Caproni revealed, agents want to be able to use the information found in a subject’s trash to pressure that person to assist in a government investigation. Under the new guidelines, surveillance squads can also be deployed repeatedly to follow “targets,” agents can infiltrate organizations for long periods of time before certain undisclosed “rules” kick in, and public officials, members of the news media or academic scholars can be investigated without the need for extra supervision.”

https://www.huffingtonpost.com/john-w-whitehead/the-new-fbi-powers-cointe_b_880467.html

NOTE:  Many officials, attorneys, judges, politicians, etc., are afraid to get involved in this hideous, egregious violation of Human Rights fearing these heinous, corrupt operations, will come after them and destroy their lives and careers.  Secrecy is pivotal to prevent national DISGRACE  and, no one is above the beamed psychophysical influence and torture, NO ONE.

Overt and covert influence, unknowingly ultimately guarantees this program remains, well-hidden, and that horrific continued nonconsensual human experimentation continues without oversight. The result is that “The Program” can continue its covert destruction and remains cloaked.

 

“In general, the greater the understanding,

the greater the delusion; 

the more intelligent, the less sane.”  

George Orwell – 1984

 

Again, the question is “how far will these covert operations go?”  

As shown, circled in red, I have two LAPD personal drone, stationary over my residence, 24/7, believe it or not, in sync with a smaller weaponized  drone.  When I move, they move East, West, North or South guided from a state-of-the-art counter-terrorism division by official use which can also happen from established neighboring locations.   As explained the mission is intentional beam cooking of the target’s head, legs, heart, lungs, breast etc., surgical areas by men working in shifts, who do this for a living today,  which continues with each shift.  Beamed energy weapon cooking during the wee hours of the morning while sleeping clearly reveals heinous intent to include widespread use of Sonic weapons used for neurological damage.

Living with threats of my demise in the background of my phone, with an FBI residential satellite office minutes away, without a doubt, the small memory card, shown shown above was planted.

 

I DID NOT PUT THE DISC IN A FLOWER

POT IN MY BATHROOM – GUARANTEED!

 

The images on the memory card, I realized immediately revealed an obvious hope to connect me with Islamic Terrorist.   As shown, I torched it IMMEDIATELY, after viewing its damaging content. You must admit that if successful, the images would have surely have ignited a successful raid on my home, and difficulty to prove no association by me, and guilt by association when you look at the full picture.   There were two business visitor’s days prior.  This operation knew both were coming through monitoring of my phone conversations and both were likely contacted.  I am betting on the life insurance agent.

Again, if found on my premises, it would have appeared that the disc with nearby 30 individuals in training, were involved with me and possibly reporting their progress to me as if keeping me updated on their activities.  The real images on the memory card also depicted, not only Islamic men and women, but also Islamic children holding assault weapons, and smiling, also appearing to be at the camp program.  For all I know the audio that accompanied a few of the images could men “Death to America.”

 

 

And when all else fails, lest not forget the unified silencing tactic of using psychiatrist and psychologist on intel agency payrolls making the perfect fit or the history of psychiatry.

 

NAZISM AND PSYCHIATRY

http://guardianlv.com/2013/09/nazism-and-psychiatry/

 

The mental illness tag continues to be strategically attached to 10,000 plus “TARGETED,” aware and awakened, when reporting the structure of this program, and ongoing nonconsensual human experimentation on a large scale.

NEW YORK TIMES REPORTS “10,000 CRAZIES” AS TARGETED INDIVIDUALS

https://www.intellihub.com/ny-times-hit-piece-targeted-individuals/

High-level agency corruption many report is responsible for the media blackout, media gag orders, and planted media news reports.  

In many cases, these operations do not want anyone dispatched, the local Sheriff etc., to the target’s home for the strategic involuntary committing narrative if the home is well organized, neat, clean and the target well-groomed and articulate and doesn’t fit the perceived narrative.   Repeatedly this operation has reported, “They don’t want anyone to pick her up at her house” several times during the harassment on my phone.  Your house, and how it is maintained is a representative of you, cleanliness is next to Godliness, or a picture is worth a thousand words.

 

Screen Shot 2018-07-04 at 8.20.30 PM

 

 

Screen Shot 2018-06-28 at 10.19.55 PM

 

Image of one of two drones monitoring and tracking me everywhere positioned, stationary, throughout the night over my residence when home or tracking when out

 

THIS IS A DECADE’S LONG HUMAN

EXPERIMENTATION PROGRAM WELL

STRUCTURED FOR OBVIOUS REASONS!

 

The fact is these operations could careless about destroying ANYONE and resulting in homelessness.  Sadly, it is a possibility that many homeless today have possibly been targeted for years and victimized through various human experimentation program which take target’s through various stages.  This is especially true as awareness of patented “Synthetic Telepathy” aka the DOD “Voice of God” becomes aware.  Using a homeless person, has happened around me before and is quite bizarre unless you understand what is truly happening, how it is done and why.  A homeless person at Starbucks focused on me one day, out of the blue, angrily and even called the police saying I threatened him.

 

HOMELESS HUMAN GUINEA PIGS

DESTROYED BY THE BOGUS SCHIZO TAG

 

Screen Shot 2018-07-11 at 12.55.01 PM

LINK TO ABOVE ARTICLE

https://www.washingtonpost.com/local/social-issues/the-homeless-man-who-graduated-from-harvard-law-school-with-chief-justice-john-roberts/2015/07/13/63257b5c-20ca-11e5-bf41-c23f5d3face1_story.html?utm_term=.d02227e72db5

 

A BEAUTIFUL MIND

The true story of John Nash, Princeton, told in the movie “A Beautiful Mind” hints at Radio Frequency Identification Chip (RFID) implantation historic testing.

 

WIKIPEDIA DETAILS

https://en.wikipedia.org/wiki/A_Beautiful_Mind_(film)

 

Screen Shot 2018-07-11 at 1.12.09 PM.png

“A BEAUTIFUL MIND” TRUE STORY

 

THE FACT IS, JOSE DELGADO,

PHYSIOLOGY PROFESSOR AT YALE UNIVERSITY,  

WORKED ON BRAIN IMPLANTS IN THE 60s.

 

“We need a program of psychosurgery for political control of our society.  The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Some day armies and generals will be controlled by electric stimulation of the brain.”

—Dr. Peter R. Breggin, summarizing parts of Dr. José Delgado’s writings (February 24, 1974 edition of the Congressional Record, No. 262E, Vol. 118)

 

 

THIS TECHNOLOGY IS IN FULL USE

TODAY, LOGICALLY IS NOT SITTING ON A

SHELF WITHIN THE MILITARY INDUSTRIAL

COMPLEX COLLECTING DUST!

 

By thousands of documented reports, which include those who once worked as insiders in “The Program” this is how Remote Neural Monitoring technology can be used and its patented purpose,  and  has been for decades.  

Using others, i.e., a homeless person is also perfect plausible denial.

The beamed influence can be accomplished by sitting before a Brain Computer Interface (BCI) supercomputer system miles away, in a high-tech counter-terrorism division, numerous nationwide, through emotional frequency management and manipulation of your brainwaves for example using patents, officially patented to alter consciousness, or the agitate the nervous system.

 

GET THE PICTURE?

[EXCERPT]

Jose Delgado’s work, “Presented a nightmarish future where anyone who threatened the state could be controlled…

 

 

NOTE:  Brain Implants today are no longer necessary for specific focus on targets,  by use of biometrics, however, RFID chips are still in consideration GLOBALLY!

 

 

Thank God, targets nationwide and globally placed into this program cannot be controlled and this possibly key to why many report targeting in childhood.

Take it from thousands within the USA and millions all over the world, a high-tech program of mass, social and population control has been unleashed!  Then research for yourself!

 

“In George Orwell’s 1984, the fake terrorist threat

is very effectively used as a tool to spread fear and

compliance among the population

of ‘Airstrip One’, the new name for Great Britain.”

 

HOW THE “WAR ON TERROR” / DOMESTIC

TERRORIST LABEL 

CAN BE USED FOR FRAMING

 

[EXCERPT]

According to US government propaganda, terrorist cells are spread throughout America, making it necessary for the government to spy on all Americans and violate most other constitutional protections. … If America were infected with terrorists, we would not need the government to tell us. We would know it from events…. the US government substitutes warnings in order to keep alive the fear that causes the public to accept pointless wars, the infringement of civil liberty, national ID cards, and inconveniences and harassments when they fly. The most obvious indication that there are no terrorist cells is that not a single neocon has been assassinated. — Paul Craig Roberts, “The War on Terror is a Hoax”, 2009

http://themillenniumreport.com/2014/08/the-fake-war-on-terrorism-and-the-real-war-on-islam/

 

Screen Shot 2018-07-04 at 8.20.43 PM

 

Mentioned earlier, the small memory card found in my bathroom after a business meeting.  Shocked when I found it was torched immediately.  

Below are only examples of the close to 50 images found on the memory card, from the internet.

 

Screen Shot 2018-07-04 at 8.30.48 PM.png

 

MEDIA USED TO PERSUADE PEOPLE’S

ATTITUDES, BELIEFS, AND BEHAVIORS

https://web.stanford.edu/class/e297c/war_peace/media/hpropaganda.html

 

I also have had to check all Facebook groups randomly over the years, and the 250 groups I have been added too without my permission.   On Facebook, anyone can add you as a member to any group without permission or your awareness and the add is overlooked by you as a brief pop-up.

Periodic checking has weeded out numerous Facebook groups who appear to also have some type of Islamic Terrorist connection, in which I was added, but likely, instead, hopeful use for an official COINTELPRO strategic set-up efforts.  In fact, recently I was sent a friend request from someone appearing to have obvious Islamic ties, which I continue to catch, so far, and block immediately.

LET ME MAKE THIS CLEAR!

 

Screen Shot 2018-07-04 at 8.21.18 PM.png

 

EDUCATE YOURSELF

 

 

Screen Shot 2018-06-10 at 9.56.35 PM

IS IT PSYCHOPATHIC EVIL,  

SATELLITE PSYCHOTRONICS 

AND/OR A GLOBAL PARADIGM?

 

Aquino Army

 

 

VETERANS TODAY ARTICLE – DENIAL OF TRUTH,

MIND CONTROL, AND SATANISM IN AMERICA

https://www.veteranstoday.com/2013/01/14/denial-of-truth-mind-control-and-satanism-in-america/

 

In 1981, Major Michael A. Aquino collaborated with Colonel Paul E. Vallely to produce a paper entitled From PSYOP to MindWar: The Psychology of Victory.  

The paper was submitted to Military Review and Parameter, the publication of the U.S. Army War College.  It was widely circulated among the psyop community and among mind control researchers without a copyright notice.

 

NSA CONTRACTOR LAWSUIT DETAILING

ELECTRONIC BRAIN LINK (EBL) 

http://www.angelfire.com/pro2/dchakrab/ebl_rnm.htm

 

SATELLITE SURVEILLANCE AND HUMAN EXPERIMENTATION

https://jacobsm.com/baird/index.html

 

Screen Shot 2018-06-05 at 11.30.48 AM

 

“Men are Only as Good

as their TECHNICAL DEVELOPMENT

Allows them to be”

George Orwell – 1984

 

Screen Shot 2018-06-05 at 10.19.58 PM

 

 

Screen Shot 2018-06-09 at 7.47.45 PM

 

HOW SILENT SOUND WORKS

https://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon38.htm

 

Screen Shot 2018-06-07 at 3.16.47 PM

 

There will be no loyalty, except

loyalty towards the Party.

There will be no love, except the

love of Big Brother. 

George Orwell 1984

 

THE NEXT TERRORIST ASSAULT –

TETRA MIND CONTROL OF POLICE/MILITARY?

[EXCERPT]

“The history of mind control at a distance, remote mind control technology (RMCT) begins in America with the research of Dr. Ross Adey (UCLA) and his colleagues in the late ’60’s, working on the CIA-funded Pandora Project. Dr. Adey was frequently mentioned in many of Robert O. Becker’s books on electromagnetic aspects of life. Adey found that ELF (extremely low frequency) signals on the region of 1-20 Hz (with 0.1 increments having different effects), had bioactive and psychoactive effects. The research was important to the CIA for they wished to find frequencies which could mind control humans from a distance (RMCT). Pandora researchers discovered that the 6-16 Hz region had drastic effects on brain and on nervous and endocrine systems.  This could enable major dysfunction in the target victim if research on cats and monkeys could be duplicated.  The research on human victims done by Dr. Delgado still remains classified by the US government to this day.”

FULL LINK TO ABOVE ARTICLE

https://www.linkedin.com/pulse/next-terrorist-assault-tetra-jack-kruse/

 

People Sleep Peaceably in their

Beds at Night only Because Rough Men

Stand Ready to do Violence on Their Behalf.

George Orwell – 1984

 

TETRA – MIND CONTROL

OF POLICE AND MILITARY PERSONNEL 

http://www.rense.com/general11/mm.htm

 

“Nothing was Your Own Except the

Few Cubic Centimetres inside Your Skull. ” 

George Orwell – 1984

 

LAPD THE ORWELLIAN THOUGHT POLICE 

https://www.activistpost.com/2018/05/activists-uncover-pre-crime-police-program-operated-by-lapd.html

 

“Winston Smith: Does Big Brother exist?

O’Brien: Of course he exists.

Winston Smith: Does he exist like you or me?

O’Brien: You do not exist.”

George Orwell – 1984

 

 

WEAPONIZED DEADLY DRONES

Weaponized drones are old news for the Los Angeles Police Department, the FORERUNNER.

 

CONNECTICUT KILLER DRONE INITIATIVE APPROVED

http://www.timesunion.com/7dayarchive/article/Connecticut-considers-killer-drones-for-cops-11041325.php

 

 

LAPD IS FULLY EQUIPPED AND DEADLY DRONES ARE IN FULL USE

http://www.latimes.com/local/lanow/la-me-ln-lapd-drones-20171017-story.html

 

Police forces across the United States have been transformed into extensions of the military. Our towns and cities have become battlefields, and we the American people are now the enemy combatants to be spied on tracked, frisked, and searched. For those who resist, the consequences can be a one-way trip to jail or even death. Battlefield America: The War on the American People is constitutional attorney John W. Whitehead’s terrifying portrait of a nation at war with itself. In exchange for safe schools and lower crime rates, we have opened the doors to militarized police, zero tolerance policies in schools, and SWAT team raids. The insidious shift was so subtle that most of us had no idea it was happening. This follow-up to Whitehead’s award-winning A Government of Wolves is a brutal critique of an America on the verge of destroying the very freedoms that define it. Hands up!―the “Police State” has arrived.

 

Screen Shot 2018-07-02 at 9.18.04 PM

 

IF A LOT OF PEOPLE ARE SAYING

THE SAME THING, LISTEN!

 

 

Electromagnetic weapons are sold to the public as “non-lethal” however, the way secret police units are using these systems and devices, relentlessly is anything but.

Most LAPD officers operate professionally, but of course, in any large group, the bad is found right next to the good.  While there’s never a just cause for it, police misconduct still happens in Southern California and secretively for good reason.  Misconduct by law enforcement officers can include verbal abuse, excessive force, today beamed technological assault and racial discrimination.  Police officers may use necessary force, but the law now imposes and strictly enforces limits on what is allowed.  This is why the advanced technology use is hidden.  It takes police brutality to a whole new level.

A major evolving issue, little known across Los Angeles County, is that military technology, which is intentionally not publicized as being used or public awareness of this fact, in a unified microwave high-tech COINTELPRO.  LAPD’S satellite division, for example, operates solo from the military US Space Command, global targeting capability, and enjoyed the distinction of being the pilot program example and role model evolvement.   Today, all branches of law enforcement have state-of-the-art high-tech counter-terrorism divisions Federal, state and local police departments nationwide with satellites and drone capabilities and military connections.

[EXCERPT]

SATELLITE TO DRONE MONITORING CONNECTION USED BY LAPD]

To meet its full range of requirements, LAPD chose Spacenet’s satellite communications system. The system is integrated with Raytheon’s ACU-2000 IP interoperability system, which provides a SIP-based gateway to digitally converge existing radio systems with SIP telephones, networks, and devices, and with solutions from Rivada Networks, a provider of wireless, interoperable public safety communications networks. The system joins disparate communications systems that can be connected, monitored and controlled over an IP network and enables two-way radio users to access to features that have traditionally been available only to telephone users. In addition, the distributed network design is intended to provide continuity of local operations in the event of network failure. LAPD started implementing its satellite network for its command posts in 2009 with the goal of providing a reliable communications outlet for big events and emergency situations across the city. LAPD worked with Spacenet, Raytheon and Rivada Networks to implement the comprehensive communications network, including satellite services and equipment, and support for Wi-Fi, WiMAX, and full LMR integration.

FULL LINK TO ARTICLE

http://www.milsatmagazine.com/story.php?number=1559264608

 

“If Both the past and the external world

exist only in the mind, and if the mind itself

is controllable – what then?”

George Orwell – 1984 

 

 

A SPECIAL BREED, INSANELY, STRATEGICALLY HIRED FOR

THIS PROGRAM, MANNING THE TECHNOLOGY.

ARE THEY TETRA PROGRAMMED KILLERS?

Screen Shot 2019-03-27 at 12.55.04 AM

 

BE VERY CAREFUL WHO YOU PUT YOUR

FAITH AND TRUST IN,

CORRUPTION IS UNCHECKED TODAY

 

 

FBI AGENT DID A BACKFLIP “FREESTYLE” DANCING AND ACCIDENTALLY SHOT SOMEONE 

https://www.washingtonpost.com/news/post-nation/wp/2018/06/03/an-fbi-agent-did-a-backflip-in-a-club-dropped-his-gun-and-accidentally-shot-someone-police-say/?utm_term=.9dce7324c788

 

“But it was alright, everything was alright,

the struggle was finished.

He had won the victory over himself.

He loved Big Brother.”

George Orwell – 1984

 
HOW THE WAR ON TERROR HAS MILITARIZED THE POLICE

https://www.theatlantic.com/national/archive/2011/11/how-the-war-on-terror-has-militarized-the-police/248047/

This so-called “War on Terror” has evolved into a hidden objective and the technology used in opposition to any or every united voice, the Constitution, and against the very real and decisive global effort unfolding today all over the world by agenda where mass population control becomes mandatory.

In place today is a technologically advanced, program that serves to silence any public awareness by inhumane, horrific violations, protest, and not only the denial of very basic human rights but today, horrendous denial of that which made our country great, Constitutional and Civil Rights.   

 

HIDDEN BECAUSE IT IS ILLEGAL!

 

Screen Shot 2018-05-25 at 10.24.47 PM.png

 

[EXCERPT]

Undoubtedly the rationalization of using this technology in such a way would be to fight “terrorism.”  But what would stop law enforcement and government agencies from using it against U.S. citizens who are political dissidents, or oppose the government’s position on issues like mandatory vaccines, or GMO foods, for example, or exposure of hidden technology use?

https://healthimpactnews.com/2017/can-new-5g-technology-and-smart-meters-be-used-as-weapons/

 

“In the face of pain there are no heroes.”

George Orwell – 1984

 

 

[EXCERPT]

“The news media are filled with a growing number of incidents of and complaints about police brutality, official misconduct, and outright criminal acts perpetrated by the same people who are supposed to protect and defend the general public from precisely these kinds of crimes.”

 

FULL LINK TO ABOVE ARTICLE

https://100777.com/node/1796

 

Screen Shot 2018-05-25 at 10.40.04 PM

 

Practices which had been long abandoned …

imprisonment without trial…

torture to extract confessions …

were tolerated and even defended.

George Orwell – 1984

 

People are being cooked alive, similar to a piece of meat in a microwave oven, both inside their homes and out through 24/7.

http://defense-update.com/20060505_nlw-dew.html

 

THERE IS NO PROTECTIVE SHIELDING

AVAILABLE FROM BIOMETRIC WEAPONS,

WHICH THESE HIDEOUS HUMAN MONSTERS,

ARE USING TO SLOW COOK THE HUMAN BODY

https://www.military.com/defensetech/2006/12/29/pain-beam-not-easily-foiled

 

“You will be hollow.  We shall squeeze you empty,

and then we shall fill you with ourselves.”

George Orwell – 1984

 

Screen Shot 2018-07-01 at 2.18.44 PM

 

Screen Shot 2018-05-26 at 6.49.54 PM

The U.S. Special Operations Command is focused primarily on those special operations and supporting functions that combat terrorism…

 

Screen Shot 2018-05-27 at 11.36.30 AM

 

Screen Shot 2018-05-27 at 11.33.58 AM

“REMOTE CONTROL WAR” ON THE CIVILIAN POPULATION

 TARGETED JUSTICE WEBSITE

 

NOTE:  The US Special Operations Command, Schriever, or Peterson AFB are not, I repeat, are not the only satellite communication connection used for civilian targeting operations in today’s unified “Militarized Police State” within the USA.

Post 9/11 advanced psychophysical technology, real-time, biometric, electromagnetic, extremely low-frequency beams, etc., are now well established in advanced technology operation centers of civilian agencies and DOD contractors are playing a pivotal role and supplying various services.

 

COMMERCIAL SPACE (SATELLITES) AND

UNITED STATES NATIONAL SECURITY

https://fas.org/spp/eprint/article06.html

 

NATIONWIDE RECRUITMENT OF “OFFICIAL ORGANIZED STALKING” 

SURVEILLANCE ROLE PLAYERS (ZERZETZUNG STASI METHOD)

https://researchorganizedgangstalking.wordpress.com/2017/03/01/gang-stalking-and-surveillance-role-players/

 

IS THIS AN FBI PROGRAM?

 

Screen Shot 2018-05-28 at 3.34.24 PM

[EXCERPT]

Freedom Of Information Act documents prove that DOJ deliberately under-estimated the number of multi-stalker victims (FOIA Request # 10-00169)

Why would the Justice Department deliberately lie to the American people about the true number of victims of multiple stalkers?

Why has DOJ never prosecuted a multi-stalker case?

Why does the DOJ-funded Office for Victims of Crime (OVC) offer assistance to single stalker victims, but not to victims reporting multiple stalkers?

Could the answer be that DOJ ITSELF is somehow involved in this type of stalking?

FULL LINK TO ABOVE ARTICLE

https://www.thomhartmann.com/users/bluedog-294/blog/2015/06/gang-stalking-realis-it-fbi-program

 

EX FBI AGENT GERAL SOSBEE TARGETED

http://la.indymedia.org/news/2013/04/259589.php

 

Screen Shot 2018-05-30 at 11.13.39 PM

 

REDDIT – COUNTER-INTELLIGENCE DISRUPTION

aka GANG & ORGANIZED STALKING

 

[EXCERPT]

Deny, Disrupt, Discredit

Deniability is critical to their operations.  Incidents of harassments are designed to leave no evidence and have a plausible innocent explanation.  But we have the internet and people talk so you can expect them to counter the claims.  Remember that Snowden revealed that intelligence agencies were actively trying to silence online critics of government policy.  As expected, disinformation to discredit valid claims of disruption operations and surveillance are prevalent.  This includes posts that make wild claims of what sounds like psychotic episodes.

 

CLICK WITHIN BOX BELOW FOR REDDIT

INFORMATION AND ALSO NUMEROUS

U.S. TARGET TESTIMONIES…

 

Since Sept. 11, however, military and law enforcement agencies have worked much more closely not only to help detect and defeat any possible attack, including from unconventional weapons but also to assure the continuity of the federal government in case of cataclysmic disaster.

[EXCERPT]

Mr. Arkin, in the online supplement to his book (codenames.org/documents.html), says the contingency plan, called JCS Conplan 0300-97, calls for “special-mission units in extra-legal missions to combat terrorism in the United States” based on top-secret orders that are managed by the military’s Joint Staff and coordinated with the military’s Special Operations Command and Northern Command, which is the lead military headquarters for domestic defense.

Mr. Arkin provided The New York Times with briefing slides prepared by the Northern Command, detailing the plan and outlining the military’s preparations for the inauguration.

Three senior Defense Department and Bush administration officials confirmed the existence of the plan and mission, but disputed Mr. Arkin’s characterization of the mission as “extra-legal.”

One of the officials said the units operated in the United States under “special authority” from either the president or the secretary of defense.

Civilian and uniformed military lawyers said provisions in several federal statutes, including the Fiscal Year 2000 Defense Department Authorization Act, Public Law 106-65, permits the secretary of defense to authorize military forces to support civilian agencies, including the Federal Bureau of Investigation, in the event of a national emergency, especially any involving nuclear, chemical or biological weapons.

 

FULL LINK TO ABOVE ARTICLE BELOW ENTITLED

 

Commandos See Duty on U.S. Soil In Role Redefined by Terror Fight

 

 

BASES MENTIONED IN THE

ABOVE ARTICLE 

 

Screen Shot 2018-05-26 at 7.09.15 PM

 

Screen Shot 2018-05-26 at 7.13.14 PM

NOTE:  Northcom was established Oct. 1, 2002, to provide command and control of DoD homeland defense efforts and coordinate defense support for civil authorities.

[EXCERPT]

“We want to make the military more lethal in outer space and cyberspace, at sea, on land, and in the air,” Mattis said. The department, he added, also wants to strengthen relations with U.S. partners and allies.

The department needs to examine the changing character of war, to include issues like artificial intelligence, hypersonics and outer space activities, according to Mattis.

FULL LINK TO ABOVE ARTICLE

https://www.defense.gov/News/Article/Article/1531750/us-military-seeks-to-be-more-lethal-including-in-space-mattis-says/

 

“Speculations which might

possibly induce a skeptical or

rebellious attitude

are killed in advance.”

George Orwell – 1984

 

BRAIN COMPUTER INTERFACE

& INTEL PSYOPS / PSYWAR

 

Screen Shot 2018-05-27 at 4.24.04 PM

COUNTER DARKNESS HIGH-TECH COINTELPRO WAR CRIME REPORT

https://pdf.universalaspects.io/Hi-Tech-War-Crime-Report.pdf

 

 

IS THERE A METHOD TO

THE MADNESS TODAY?  

AGAIN, AND AGAIN, IF A LOT OF PEOPLE ARE

SAYING THE SAME THING,

LISTEN!

 

Screen Shot 2018-03-29 at 1.04.01 PM

 

FREE ON YOUTUBE AND VIMEO!

 

Screen Shot 2018-03-21 at 9.52.50 PM

 

AMAZON DVD PURCHASE

https://www.amazon.com/DECEIVED-Control-Schizophrenic-High-Tech-Fraud/dp/B07F6Y5NRY/ref=sr_1_fkmr0_2?ie=UTF8&qid=1536283876&sr=8-2-fkmr0&keywords=deceived%3A+mind+control+schizophrenia

 

The Party exists.

Big Brother is an embodiment of the

Party.  The Party is a

dedicated sect doing evil.

George Orwell – 1984

 

 

 

[EXCERPT]

Professional soldiers and counterterrorism analysts alike confirm that targeted killing is among the most effective tactics in the Western democracies’ toolkit.

Moreover, technological improvements in intelligence gathering and munitions are sure to further limit collateral damage in future operations.

https://www.thedailybeast.com/the-hit-and-miss-record-of-us-targeted-killing-programs

 

Screen Shot 2018-05-27 at 9.29.53 PM

FULL 1961 TWILIGHT ZONE “OBSOLETE MAN” EPISODE

https://archive.org/details/TheObsoleteManS2TwilightZoneFullEpsiode

The Moral of the Story…

 

Ultimately, ENFORCERS 

will become OBSOLETE in a program

WHERE NO ONE IS EXEMPT!

 

Screen Shot 2018-06-08 at 11.03.42 AM.png

 

“What are you in for?”…

“I allowed the word ‘God’

to remain at the end of a line.”

George Orwell – 1984

 

ORWELL TODAY

http://www.orwelltoday.com

BLOG WEBSITE

http://bigbrotherwatchingus.com

WHISTLEBLOWERS

http://www.biggerthansnowden.com

RENEE PITTMAN’S AMAZON AUTHOR PAGE

https://www.amazon.com/Renee-Pittman/e/B005VK7Q3S

 

 George Orwell – “Doublethink” TODAY

In 1984, the Party used doublethink as part of its large-scale campaign of propaganda and psychological manipulation of its leadership and the public.

Doublethink is the ability to hold two completely contradictory beliefs at the same time and to believe they are both true.  Early in the book, doublethink refers to the ability to control your memories, to choose to forget something, as well as to forget about the forgetting process.  Later on in the novel, as the Party implements its mind-control techniques, people ultimately lose the ability to form independent thoughts.  Eventually, it becomes possible for the Party to convince the public of anything, even if it’s the exact opposite of what the public already knows to be true.

 

Screen Shot 2018-06-02 at 10.54.41 PM

 

Screen Shot 2018-06-05 at 8.04.14 PM

 

EXPOSURE IS KEY!

 

Screen Shot 2018-05-25 at 8.10.12 PM.png

 

Advertisements

6 comments

  1. Thank You Harry!

    Renee does great work!

    I couldn‘t go to Idaho. My brother showed his true colors right before I was to go. I have concluded my ex-husband has been a major factor in my suffering and particularly in cyberstalking and proxy stalking that have been committed against me. He is completely hacked into my accounts and devices, from what I can tell. His hacking & cyberstalking have always been my biggest problems or certainly major problems that have prevented my regaining control of my life. I cannot dare risk discussing and writing about topics over my devices that he will only use against me; whether my ideas are true or not.

    I promise I will NEVER give up but will keep plodding along.

    I hope all is well for you! Amy

    Sent from my iPhone

    >

  2. Thanks Amy,

    The truth is snowballing, thank God! This program is being revealed, within the US, and all over the world!

  3. Renee, you are a fraud. Why to you continue to tag the name of Darlene Miles in order to sell you shit. M. Renee Pittman Mitchell, use your own Fuckin name and stop slandering the name of others. What’s the problem. Craps not selling? Fraud. I hope she sues your ass.

  4. *If a lot of people are saying the same thing, LISTEN!*

    With numerous books, blogs, websites, focused on what is happening today, the more, ACCURATE, publications the better! This method has become an outstanding weapon against this program! And these operations only come after accuracy.

    This hideous program has learned that writing books not only adds credibility revealing a sound mind but it also makes it difficult to destroy the target by applying the typical mental illness tag. The mental illness tag had been the number one tool of destruction for silencing and discrediting people revealing this program for DECADES destroying an untold number of lives.

    COINTELPRO is all over my blog and website.

    With the blog getting an average of 6,000 hits a month and near 50,000 views so far this year, as of August 2018, and an additional 7,424 hits last month in July 2018 for my website, logically, COINTELPRO is on a mission. I noticed that sitting in their operation center, they have refocused on individuals that I have had a beef with in the past. There were three Darlene R. Miles, Anthony Forwood, and Todd Giffen.

    Here are the reasons…

    Right after the Myron May incident, the FBI thought they had confiscated all of the certified mailings Myron May sent out. This included pounding on my door, hoping to, it appeared, set me up as connected with the action he took, early the next morning and brought my copy in with them saying Certified Mail, which must be signed for, was callously left on the porch, deceptively.

    About a week later, I realized Myron May had also forwarded the info to me via an unmarked email. When I saw this, knowing I am monitored 24/7 in real-time as well, I published the info immediately, under the watchful eye of this operation, using an image widely distributed on the internet showing Myron May’s many accomplishments.

    Out of the blue, someone named Darlene R. Miles, whom I had never heard of, did an interview on Talkshoe with someone named Karen, then attempting to take over Freedom From Covert Harassment and Surveillance (FFCHS) reported on the air that I had the book cover ready for Myron May’s book before he died as an apparent attempt to discredit me overall and it appeared maliciously. Needless to say, not only was I insulted but rightfully was PISSED off. So I created a blog about it.

    Regarding Anthony Forwood, I with many others believe he was at one time a genuine target, with good information, until he disappeared and his account was hacked. After this, the COINTELPRO hacker went on the attack, discrediting, me, Robert Duncan as frauds which are obvious COINTELPRO tactics and more insults. Of course, I responded, after investigating him trying to understand why.

    My solution, blog about Forwood, or someone pretending to be Forwood, and his contacting me for information, during my confusion during the tragedy and while trying to make sense of what Myron May did. When I told this person no, never having heard of him either, knowing anyone can be at the other end of a computer, he then retaliated with several vicious, discrediting blogs focused on me.

    Regarding Todd Giffen… In his case, I believe he is legitimately targeted, and desperation for relief his motivation. However, he also came after me after the Myron May incident trying to discredit me. This too was specifically after I refused information to him, and all three Miles, Forwood, and Giffen then professed that I was involved in the murder of someone, who had contacted me, and many within the Targeted community on Facebook, at the same time, who I, nor anyone else had never heard of before. Of course, I was skeptical of Myron May, he was a complete stranger in an operation that continues trying to destroy me and has used any and everyone they can. I had only heard of him 6 days prior to the FSU tragedy with the others. You don’t become chummy with me that quickly! And don’t call me with any plans as a stranger!!!

    I cut ties with a lot of people during the aftermath and accusation within the TI community that I killed Myron May or was involved. In hindsight, without a doubt, COINTELPRO sought and failed to discredit me using many in the targeted community against me, and through their programming, already targeted, and this the reason my guards are up and I am still cautioned to this day.

    Fast forward today…

    Recently, I have observed renewed interested specifically in these old blogs regarding Darlene R. Miles, Anthony Forwood, Todd Giffen, revealed in WordPress stats reports on a daily basis. These are older blogs, with little interest today, yet now a focus by someone or likely some agency. Without a doubt, I knew that this is likely COINTELPRO looking for an edge or for people to incite and use them. I have learned firsthand that his operation loves to influence people into agitation, anger, jealousy, and far worse if they can technologically manipulate people and use them to do their dirty work.

    The result was a coincidental, above message, by someone named John, Sunday, August 12, 2018.

    His response was focused on the more recent COINTELPRO set-up blog, still hoping to sly discredit the information with this blog, which I had also recently corrected after this operation inserted a ton of typographical errors. Oddly, it was sent from an email by someone who may be pretending to be John T. Tate. I had never heard of him before.

    To my surprise, a Google search revealed that he was the Campaign Manager for Ron Pauls bid for the Presidency. He was later convicted, but complied with Court Orders and freed, which leads me to believe that as a result he is likely targeted and this possibly how his name and email was used, and hacked, to contact me.

    The person who wrote this message to me today is an obvious fraud and frankly, it sounds like how Miles writes, shown in her responses to her blog, or someone other than her and their involvement in this ongoing, relentless effort around me, again, 24/7.

    Here also is a video of the real John Tate as the Campaign Manager for Ron Paul.

    I hardly think that this man speaks the way the writer writes above and for sure he likely would not have made silly typographical errors and more importantly, logically could care less about “lil ole me.” Yet his email was used, and it documented to send the message to me by WordPress.

    Let me make this perfectly clear to the Targeted Community – Take me or leave me!

    My goal has always been to take information outside of this horrendously victimized community. Deleting me makes room for someone needing the information and this is not a personality contest, in the battle for my life, as I have said before, nor am I a people pleaser. God first as this operation also threatens to murder and destroy my children now if I don’t stop!

    One thing is certain, this operation is PISSED and looking for a creative way of silencing and discrediting me due logically to the heavy traffic to the blog and website each month.

    Of course, they want me SILENCED and obviously, it appears worse, some would argue.

    Understand that nothing I do has ever been about financial gain but exposure and books my weapon of choice joining many others. If I were about money, I would take the blog and website down. People are educated by both fully so there is no desire to buy books. I must admit, I did consider it, which would draw attention to the books, and to what has happened to me, but again, this is not about money, and all publications will remain. This is until this operation, in the ongoing high-tech COINTELPRO effort and hope to have the information taken down it appears by the techno death squad circling.

    Lastly, years ago, I did use Renee Pittman M. for the first publications, again years ago. This is because Mitchell is my ex-police husband’s name and I did not want to give him credit by attachment. I should have had my name changed a long time ago, but my daughters are all named Mitchell. I did drop the M. because it looked silly to me, and for years since have used my real name, Renee Pittman for the books, with Renee Pittman Mitchell is revealed as my legal name on my Facebook page along with “Renee Pittman Books.” I have nothing to hide.

    To whoever wrote this message to me, my position is firm. I will take down the Darlene R. Miles’ blog when she proves that I had a book cover made for a dead man, Myron May before he went postal and lost his life, and not a moment before.

    It’s simple… Or in reality, this operation still hopes to motivate someone, anyone.

    The game plan is to destroy everyone and especially those heavily targeted already or kill two birds with one stone, I learned during the Myron May tragedy.

    I just cannot let a horrendously wrong accusation remain in the spotlight. If this Talkshoe episode was deleted, I also would consider taking down the blog.

    The fact is, you cannot make vicious allegations of this nature and not expect a RIGHTFUL response, after trying to cleverly destroy another, then like a kid, cry foul after you started the situation, by attempting to vindictively slander someone you do not even know! And then, unbelievably, outrageously, threatened a bogus lawsuit or hope the person who initiated this issue by original slandering the person they targeted on the air.

    This comment is just plain ridiculous!

    P.S., “Just don’t call me “Late for Dinner!”

    No one is tagging her specifically, she is not that important in the grand scheme. The tags were created years ago and are simply copied and pasted identically to each blog. They are now fixed in WordPress.

    Stop following me, whoever you are or pretending to be. No one cares! This is old tire news you are attempting to rehash.

    Moving right along…

  5. Hi
    I am from Mozambique, and under mind reading technology, which is public through many kind of media.
    I would like to know if isn’t it enough to prove that my brain was hacked, and provide an useful matter to sue the perpetrators.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.