Wednesday 8 August 2007

Excerpt

Coherent Madness: Effective Defense Against
Covert Warfare


“Believe nothing, no matter where you read it, or who said it, no matter if I have said it, unless it agrees with your own reason and your own common sense.” Buddha (563BC-483BC).

Table of Contents

Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 1:Prologue. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2: Who Are These People?. . . . . . . . . . . . . . . . . .
Historical Parallels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Personality Profile of the Average Gang Member . . . . . . . . . .
Organization: Hierarchy and Connections . . . . . . . . . . . . . . .
Institutionalization of Covert Warfare . . . . . . . . . . . . . . . . .
Chapter 3: What are The Attack Methods? . . . . . . . . . . . . . .
Psychological Harassment . . . . . . . . . . . . . . . . . . . . . . . .
Direct Physical Violence . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 4: Why People Become Targets of Covert Warfare. . .
Preemptive Strategy: Potential Threat Elimination. . . . . . . . .
Mentacide: Deliberate Destruction of the Mind. . . . . . . . . . .
Relational and Other Problems. . . . . . . . . . . . . . . . . . .
Xenophobic and Racial. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Political and Economic. . . . . . . . . . . . . . . . . . . . . . . .
Chapter 5: Dispelling Doubt. . . . . . . . . . . . . . . . . . . . . . .
Clearing the Fog Of Doubt. . . . . . . . . . . . . . . . . . . . . . . . . .
Weighing Security System Vulnerabilities. . . . . . . . . . . . . . . .
Personalized Security Systems. . . . . . . . . . . . . . . . . . . . .
Last Resort: the Mobile Home. . . . . . . . . . . . . . . . . . . .
Chapter 6: Keeping Accounts. . . . . . . . . . . . . . . . . . . .
Poison Deposit Zones. . . . . . . . . . . . . . . . . . . . . . . . .
Other Personal Accounts. . . . . . . . . . . . . . . . . . . . . .
Chapter 7: Securing Your Home. . . . . . . . . . . . . . . . . . . .
Contaminants in Solids and Liquids. . . . . . . . . . . . . . . . . . .
Airborne Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 8: Blocking Directed Energy Weapon Attacks. . . . . .
History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How DEW work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Obstruction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 9: Securing External Property. . . . . . . . . . . . . . . .
Chapter 10: Safety While Out and About. . . . . . . . . . . . . . .
Staying Alert When You Mingle. . . . . . . . . . . . . . . . . . . . . .
Securing Your Shopping. . . . . . . . . . . . . . . . . . . . . . . . . .
Going on the Run. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 11: Mental and Physical Health. . . . . . . . . . . . . . .
Health Check and Medication. . . . . . . . . . . . . . . . . . . . . . .
Meditation Based Healing. . . . . . . . . . . . . . . . . . . . . . . . .
Physical Exercise. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Healthy Mental Attitude. . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 12: Conclusion. . . . . . . . . . . . . . . . . . . . . . . . .
Bibliography. . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . .
Glossary . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . .
1
3
11

11
12
18
23
27
27
30
33
33
36
47
48
48
51
53
58
61
64
67
67
68
71
72
79
85
88
89
90
93
95
95
101
102
105
105
107
108
108
115
117
121


Introduction

I will take it for granted you already know, or have heard of people who died of what were natural causes, deaths that nonetheless raised suspicion among some people due to one anomaly or another. I will assume you know of cases where men and women, mostly activists, who were in their prime at the time, suddenly succumbed to an unlikely terminal affliction, or some other condition, be this from a sudden stroke, rapid growth of a terminal cancer, etc. Others may have taken their lives, and still some met their end through sudden, sometimes accidental, often gratuitous violence. In most social circles, especially among some races, the number of incidences of death under suspicious circumstances is indeed significant, and occurrences of such deaths repetitive enough for there to be a discernible pattern, for there to be justifiable talk of not only foul play, but a hidden agenda.

As a man who has over a prolonged period been a target of covert warfare by groups of people unknown to me, for reasons I have only recently grasped, I intend to prove that I, and an ever increasing number of people bringing forth similar accounts, are in fact survivors of a method of elimination that claimed some of the deaths considered before, a method of attack carefully designed to appear like the victim was not murdered, but died of natural causes, or unfortunate accident.

These accounts, especially the fact they have similar points of convergence, point to peculiar methods that have been adopted by law enforcement, governments, and corporations globally to eliminate those who pose a threat to them. Additionally, they imply knowledge gained through scientific research, spying and elimination methods and technologies mostly developed for the purpose of war, are now being used not to keep real enemies at bay, or to fight justified wars against threats to human freedom, but to eliminate innocent civilians, especially those who think for themselves, those who ask questions. I will then proceed to share knowledge I have gained through my ordeal, in what has been a trying and lengthy game of cat and mouse between my stalkers and me, which hopefully teaches effective methods of coping, if not defeating covert warfare.

Keep an open mind as you go along so that you avoid jumping to conclusions, because what I will write down in this book will readily resemble a lot of states and conditions that can easily stand in as viable explanations. This is unfortunately a part of the strategy of such attacks; this is what has made this method of elimination so successful to date. People who have never been exposed to certain realities seldom phantom the possibility, making them prone to rely on what they know to explain what they are hearing or seeing.

I remind you that you do not have to wait until you, a close or loved one, gets into a situation from which you cannot escape before you take actions that protect you from the full force of such attacks. You do not have to become a victim of, for example, the real habit of housing agencies in many developed countries to relocate a blacklisted individual to neighborhoods inhabited exclusively by people employed by such criminals, turning your daily life into a nightmare, or prison. You do not have to wait until you or a loved one is attacked by a criminal in the employ of these people, or gets a sudden and inexplicable physical condition before you take this seriously.

Browse through this book and take mental notes as these will prove useful in situations you may be confronted with in real life. Learn of the various methods employed in this elimination process, learn of the extent even innocuous social institutions have been infiltrated, as this will be vital in helping you identify situations where you could fall into a trap. You should especially know who qualifies for covert government harassment or elimination so you know where you, and the various personalities of those you know or will bring forth, stand.

If you do not see yourself bending to the kind of pressure those who want to keep you in the dark and in bondage will bring to bear on you to maintain or achieve this state, because you are convinced you are doing the right thing; or see the possibility someone you know will inevitably end up a victim, then you need to learn how to build a strong defense against what is as such an imminent threat. Have this information handy, to share or use for self should it become necessary. These measures against covert attack do not need actual proof of the activity to be set up, just as you would never wait to be robbed before you install security equipment. Knowing of the possibility should be a good enough incentive.

No comments: