Monday, 31 October 2016

Do Those Things That can be Considered Beyond a Computer's Capacity to Understand or Disrupt.


Cartoon impression of a mind control victim

Ever wondered what would happen to a mind control computer if we stopped responding to it?

If we stopped tricking it into thinking we are going right instead of left, if we stopped being spontaneous, if we didn't decide to go to the chemist instead of the grocery store as it would have predicted, would it get any better at all?

The fact of this matter is this, that those controlling it would not put the thing out there unless they were sure their intended targets would unwittingly help it actualise its potentials. Otherwise it would be doomed to simply remain an untested piece of hardware.

It would seem to me, after a reality check yesterday afternoon, that it's when it is in this state that it is least harmful, least likely to predict thought as such corner somebody. It has not learnt anything new that it could use to make life hard for somebody.

I have done programming before, and I know a thing or two about the code that goes into allowing a machine to learn new things. Such lines of code are never initially written into the whole of the program. However, the provision is made for the machine to add to the very code it runs on, new lines as it encounters new scenarios.

I discovered accidentally that it is in fact a better idea to let sleeping dogs remain asleep when I decided to test the super computer in my life after getting frustrated elsewhere.

I was spending time on the wierd social networking site called Facebook, when it became clear to me that friends who wanted to respond to my cries for help were having their decision making influenced. If I pushed it, I would most likely find It near impossible to communicate with them. Facebook has a way of controlling what you see, who you talk to, and so on.

Feeling Frustrated, I set out on a quest to deliver a defeat to the computer in my life so complete backup forces would become necessary.


subdermal injuries can sometimes manifest as bruises, and can be mistaken for something else

The task I gave myself involved doing my best to prevent the computer predicting my movements, as such making it fail to encumber motion and progress by making a subdermal injury caused using high intensity directed energies as I slept, act up as I walked, as such encumber motion.

Now, I have already spoken about how this is done in articles that have gone by.

Preventing the computer from predicting movement may not seem to be the same as preventing it from predicting thought, unless the impulses that turn into thought and those that enable muscle movement and control are understood to be the same, apart from the fact the one is a curtailed variant of the other.


Nothing better than a path in the bush

Now, nothing's better for what I had in mind than the criss-crossed pathways found in Africa. Pathways like this are beaten into the earth by the heels and shoes of walkers, meaning the path itself, the part that is walked on usually sinks lower than the surrounding soil.

What I wanted to be doing the most as I walked along was to keep dodging the clearly discerned directed energy beam from a military satellite focussed on the injury, as such test the computer's capacity to keep a beam focussed on the injured part of my leg despite the sudden side to side, up and down movements I made.

As I made my way from village to village, I realised I was defeating the computer every step I took that could not have been predicted because it had not been encountered before. I was successfully evading the beam more and more and, if I suddenly decided to get on top of a raised surface, I could actually feel the beam bypass me, then attempt to catch up with the new position.

Noteworthy is the fact the movements I made that were up and down, or vertical, were obviously the most problematic for the computer to keep up with.

I was feeling good, spurred on by my successes, and in part by the fact I didn't feel enervated because I was walking in the clear today. But part of me started sensing reactions that pointed to the fact the computer was compensating by broadening the beam, for example. i started feeling discomfort in regions far removed from the injury. This suggested that something more sinister was happening ...

The computer was learning.

Now how it was doing this is easy to put in words. It was writing a new line of code for every new scenario encountered, and adding that to the number of actions to look out for, or predict. Each time I walked along, the number of these previously unknown actions written into or recorded by computer code increased, decreasing with this my options.

The number of options a human being can make are always going to be limited, and if each one of these options is being checked as I take it, then, eventually, I will run out of unchecked options . I can choose to go right instead of left, or go strait in order to evade something once. When these options are known about, there will be nowhere left to go to evade that something.

And there it was, clear as daylight, I was inadvertently making the computer cleverer, much more capable of controlling some other unsuspecting mortal who is unlucky enough to be picked on by those wishing to engage all of humanity in service to a fool's plan, because it has been tested.

And so I urge you, do everything you can to defeat this evil mainframe, but avoid that which ends up making it better at the task of thought control. I advise shielding, shielding and more shielding as the best way to cut off the capacity to create a remote, wireless connection to it, or with it.

Also do those things that can be considered beyond a computer's capacity to understand or disrupt, for instance yoga, dancing or merely listening to music, etc, but always keeping in mind that once the computer gets frustrated, it will pick organ destruction as the surest manner of lowering your guard, leading you back to shields and shielding.

Sunday, 30 October 2016

Do Those Things That Intuitively can be Considered Beyond a Computer's Capacity to do


Cartoon impression of mind control

Ever wondered what would happen to a mind control computer if we stopped responding to it?

If we stopped tricking it into thinking we are going right instead of left, if we stopped being spontaneous, would it get any better at all?

The fact of this matter is this, that those controlling it would not put the thing out there unless they were sure those who could help it actualise its potentials would do so. Otherwise it would be doomed to simply remain an untested piece of hardware and software and, maybe, this is the best way to leave it.

It would seem to me, after a reality check yesterday afternoon left me feeling I was in the wrong business, that it's when it is in this state that it is least harmful, least likely to predict thought as such corner somebody.

I have done programming before, and I know a thing or two about the code that goes into allowing a machine to learn new things. Such lines of code are never initially written into the whole of the program. However, the provision is made for the machine to add to the very code it runs on, new lines as it encounters new scenarios.

I discovered accidentally that it was a better idea to let sleeping dogs remain asleep after spending some time on the wierd social networking site called Facebook, when it became clear to me that friends who wanted to respond to my cries for help were having their decision making influenced. If I pushed it, I would most likely find It near impossible to communicate with them.

Feeling I needed to find a way to distract the beast, I set out on a quest to defeat it so completely, backup forces would become necessary.


subdermal injuries can sometimes be taken for unknown causes

The task I gave myself involved doing my best to prevent the computer predicting my movements, as such making it fail to encumber motion and progress by making a subdermal injury caused using high intensity directed energies as I slept, act up as I walked, as such encumber motion.

Now, I have already spoken about how this is done in articles that have gone by.

Preventing the computer from predicting movement may not seem to be the same as preventing it from predicting thought, unless the impulses that turn into thought and those that enable muscle movement and control are understood to be the same, apart from the fact the one is a curtailed variant of the other.


Nothing better than a path in the bush

Now, nothing's better for this than the criss-crossed pathways found in Africa. Pathways like this are beaten into the earth by the heels and shoes of walkers, meaning the path itself, the part that is walked on usually sinks lower than the surrounding soil.

What I wanted to be doing the most as I walked along was to keep dodging the clearly discerned directed energy beam from a military satellite focussed on the injury, as such test the computer's capacity to keep a beam focussed on the injured part of my leg despite the side to side, up and down movements I made.

As I made my way from village to village, I realised I was defeating the computer every step I made that could not have been predicted because it had not been encountered. I was losing the beam more and more and, if I suddenly decided to get on top of a raised surface, I could actually feel the beam bypass me, then attempt to catch up with the new position.

Up and down movements were obviously the most problematic.

I was feeling good, spurred on by my successes, and in part by the fact I didn't feel enervated because I was walking in the clear today. But part of me started sensing reactions that pointed to the fact the computer was compensating by broadening the beam, for example. This suggested that something more sinister was happening ... The thing was learning.

Now how it was doing this is easy to put in words. The thing was writing a new kind of code for every new scenario encountered, and adding that to the number of actions to look out for, or predict. Each time I walked along, the number of these actions written into code increased, decreasing with this my options.

And there it was, clear as daylight, I was inadvertently making the thing cleverer, much more capable of controlling some other unsuspecting mortal who is unlucky enough to be picked on by those wishing to engage all of humanity in service to a fool's plan.

And so I urge you, do everything you can to defeat this evil mainframe, but avoid that which ends up making it better at the task of thought control. I advise shielding, shielding and more shielding as the best way to cut off the capacity to create a remote, wireless connection to it, or with it.

Also do those things that can be considered beyond a computer's capacity to do, things you can term human things, but always keeping in mind that once it gets frustrated, it will pick organ destruction as the surest manner of lowering your guard, leading you back to shields and shielding.

Sunday, 16 October 2016

Come With Me If You Want To Live

America, read NATO, is more dangerous to your security and other basic aspirations when operating in covert mode. Right now this nation is engaged in multiple theatres of war around our globe, and you will not believe who, in some remote village in the third world, their satellites have zeroed in on for control or elimination.

He/she is an important piece in their game, and you have never even heard of him/her.

They are everywhere right now, doing it to thousands, in a bid to get rid of those they feel will stand in the way of their efforts to inherit the earth.

The preemptive thing has surpassed "Minority Report" proportions by far, so know they have people picked for the most bleak of genetic connections.

They are using technology to achieve all this, of which eavesdropping and attack technologies via directed energies are the most important. Right now, their most effective tool is remote neural monitoring.

Cannot stress this enough, guys, gals, the distinguished, everybody else ... You have got to keep your head up. They are destroying our family ties, our communities with this technology and we have to react, asymetrically.

We are at war with a better armed enemy and, with no chance of catching up, the best we can do right now is fight back asymetrically.

This is a theme I will return to, again and again, as we battle to trash their billions spent creating the perfect instrument of control ... The machine that reads minds, and controls behaviour. This is the biggest threat in this war, and our efforts should be directed at neutralizing its influence.

You will get clouted about as the war intensifies, but always remember to keep your head up, and by all means always be spontaneous.

To help you in this endeavour, get you all spontaneous and multitasking. listen to music, sing along and, if possible, break into an expressive dance, you know? The kind where you are telling a story ... Your body parts moving to different beats in the music.

Do this whenever you are feeling beat down, understanding as you do this that computers "no comprende" the human mind and body in musical motion. Thats a human thing.

If you get into expressive dance, then you might as well be multitasking where the machine is concerned.

It gets defeated.

And this is what we want to happen again and again. Have the vermin spend the better part of their time reconfiguring the connection. That should get them off the idea they can conquer man's mind sooner than later.

Depending on how much they need to access your inner thoughts, they might try to beat some of the resistance out of you by way of damage to vital organs using directed energies. The mental routines outlined above or elsewhere on this blog will protect your mind from getting read, and manipulated, but it will not protect you from the damage directed energies can cause to tissue, that will slow you down mentally and eventually leave you too weak to resist control.

Therefore, ensure that you have an area in your home that protects you from the worst of such attacks, an area you can spend the crucial time of sleep in, the time for your body to do the mending that is required in the situation.

Also remember that they make it a point to cause most of the damage to your body they can abuse later on during the night, when you are fast asleep.

It does not matter who you are, or the important work you do, that makes you the important person that you are. You may be walking around with implanted memories without knowing it, causing havoc to your family/community. Follow the program. Get ur butt into that club and keep it off the wall.

Sunday, 9 October 2016

The Methods/Tactics That Defeat Remote Neural Monitoring Technology and the Reactions that Confirms The Defeat



I came across the post pasted below in my Facebook newsfeed, and found it worth sharing with visitors to my blog.

It speaks of the things one can do to frustrate efforts at mind reading, and mental manipulation.

I found parallels between Bryan's experiences and mine in the reaction from the agency that confirms that their technology has been defeated, the only difference being all I did was disable the transmissions from my brain by constantly wearing a metal cap that was properly insulated from my scalp, while also blocking out UltraSound and InfraSound entrainment transmissions to my brains by adding a rubber, wool or leather cap to the conducting layer hat, as well as plugging my ears with gum plugs.

The resultant attempts to make me ditch the habit that involved activities similar in nature to what Bryan describes revealed to me that the cap worked. They could obviously no longer gain sufficient access to my mind to read it in any useful way.

In response, they sent women my way (honey traps), and I knew who was sending them but acted the fool, otherwise they sent men who tried to befriend me by engaging me with issues I am passionate about, the entire gamut.

And, it turned out, each and everyone of these persons had the efficacy of my shields in mind. I was making things worse "for myself" by wearing shields, they all said. I remember this particular individual who insisted the ricochet effect within the shielding meant I was exposed more to directed energies.

Wearing metals on your person may not be for you. If so, then check out the methods that also deliver good results, as Bryan explains below.

.................................

Bryan Tew>‎John Finch

EACH TIME I ENGAGE IN AN ACTION OR ACCESS SEQUENCE THE CIA DIA RNM SUPERCOMPUTER COULD OR DID NOT PREDICT THE CIA DIA HIVE MIND TEAMS HIDING BEHIND LAW ENFORCEMENT ARE MOVING IN CLOSE TO ME ENGAGING IN SITUATIONAL & CONVERSATIONAL SCENARIOS DESIGNED TO KEEP ME (THE MIND CONTROL VICTIM) FROM DEFEATING THEIR TECHNOLOGY

You can defeat the RNM mind control attacks by constantly multitasking (thinking about or doing multiple things at once), quenching, redirecting, and being SPONTANEOUS (*Drum Roll Please*) and, for example, by ignoring random encounters with strangers you don't know as such encounters are engineered as 'SITUATIONAL SCENARIOS' & 'CONVERSATIONALSCENARIOS' by the orgainized stalking perps in order to solicit an emotional response from you which their RNM system can remotely measure and integrate back into RNM data for use in the next wave of your ENDLESS harassment to pitch you into some action or access sequence using trigger words, colors, symbols, objects, images, etc., to gauge whether their neuro-programming is working.

Then you can not only see through the RNM system's attempts to manipulate you but also manage their ability to evaluate your responses by controlling the 'verification process' by working through the remote neural 'memory blocks' and counter the system's ability to influence your choices.

Remember, Mind Control technology is about blocking your real memories and injecting with fabricated and falsified memories. This is the second category of CIA DIA Mind Control known as MEMORY MANAGEMENT.

In order for their RNM Mind Control technology to be effective they must keep the mind control victim from defeating their technology because if it happens then they must start all over again with a new Verification Process, etc.

So, then, the RNM Supercomputer must predict the choices of the mind control victim in order for that technology to work properly and if the mind control victim engages in situations or conversations the system did not predict they must prevent that situation or conversation from disrupting the pattern they are attempting to build and one tactic called the 'FLOATING BOX' is what they use to keep the victim from defeating the technology.

Never follow a set pattern of conduct. Always change your behavior every day at a moments notice. Do this when you're quickly (not slowly) on the move as it is more difficult for their remote neural system to monitor your thoughts while you're in rapid motion. It is not rapid motion but the effect on your brain that rapid motion has which temporarily breaks brain entrainment.

If you decide to go to the grocery store go to the convenience store instead. Change it up everyday but don't do the same things over and over as that establishes a set pattern of conduct. Remember they are trying to alter your 'Daily Motives' and 'Emotional Perceptions which is how they achieve the third category of mind control known as DIRECT BEHAVIORAL CONTROL.

The remote neural monitoring system is designed to provoke you emotionally, intellectually,physically, etc., so they can generate RESPONSE STATISTICS which the system will use to determine how to interpret and link descriptions with data captured about your memory references, etc.

Remember, its all about the CHOICE REFERENCE PATTERNS of the mind control victim so if they cannot make sense of what they see then they must revert back to your past activity and by altering your pattern of past activity in real time at speed of thought their technology is defeated.

That is why they are constantly trying to keep you talking, or constantly getting in and around you where you can see them moving next to the target, or as close as possible because they MUST CAPTURE YOUR ATTENTION or their technology fails. So they will engage in all types of action and access sequences with you using STREET THEATRE such as stopping you and asking for directions, etc. So always ignore prolonged random encounters with people you don't know. You're not being rude. Just refusing to allow them to manipulate you. They are seeking to solicit a response!

Once they have consistent response statistics the system will use previous 'CHOICE REFERENCES' (Memory Management) and inject them into your subconscious thought during normal activity which is also accompanied by simultaneous 'IMPULSE INJECTIONS' to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action, which is known as 'Verification'.You can fight and/or control this if you learn to defeat these memory attacks by learning to read Active Memory.

Once they see what you respond to emotionally, or intellectually,they will fabricate 'conversational' or 'situational' scenarios' (Street Theater) based on events or topics they know will capture your attention.

For example, if I go and make an impulse buy or impulse decision then that is something that was totally speed of thought and is called SPONTANEITY which the RNM system could not predict and the pattern is broken meaning their technology is defeated.

This is why the organized stalking perps box you in and try to keep you talking for so long, etc.. Not just to aggravate you but to provoke you into an 'emotional response', intellectual responses, etc., so they can map your thought process in order to subsequently inject impulses etc., and control your mind. This is why the feds, which the CIA DIA Hive Mind Teams are hiding behind, try to get people close to you (eg by approaching you and/or befriending with a hot girl) with so ­called 'Honey Traps'.

Here is how you stop that from happening: ignore all prolonged random encounters with strangers you don't know and be spontaneous.

This same remote neural attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured to disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.

Again, the goals of these attacks appear to be threefold:
1. CENSORSHIP
2. MEMORY MANAGEMENT
3. DIRECT BEHAVIORAL CONTROL

These people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy, hate or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they turn around to negate it and torture you nightly.

If you keep a constant handle on your 'state of activity' as well as your 'situational perception' you will recognize their street theatre and remote neural attacks resulting in conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses (emotions, etc.) and this should prompt you to re-­evaluate your current state.

Unless you have been tortured to near incoherency you should be able to fight the system's influences.

These remote neural attacks are most effective when you are stepping through sequenced tasks so try to avoid 'zoning' on your activities. How? By changing your actions and activities randomly and constantly at the speed of thought. Don't always plan out or think out your daily itinerary, if you don't have to. 'Just do it' ! Be 'SPONTANEOUS'!

Remote Neural Manipulation is accomplished via their system's ability to interpret your thoughts and is wholly dependent on its ability to predict and influence your 'reference choices' or 'impulse sequencing' during thought composition. The system maps patterns with impulses and identifiers (evoked potentials) and uses statistical data about your 'composition habits' to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system's ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers' ability to make sense of what they see visually or what they can guess based on your past activity.

Today, I was spontaneous except for the massage which I planned before I left and they had to move in immediately with a FLOATING BOX and street theatre using a combination of local Thai Operatives and foreign nationals to get as close to me as possible to show that their technology was not being defeated. It was defeated, but remember that these are contractors (psychiatrists,psychologists, behavioral scientists, neuroscientists, etc.) working for private companies hiding behind law enforcement agencies and they don't want the victim to be defeating their technology or they could lose the contract.

PAY ATTENTION AS I SHOP AND DINE OUT AND GO ON TRIPS BECAUSE ALL OF THOSE EVENTS THEY CAN NOT ALWAYS PREDICT AND THEY MUST GET VERY CLOSE TO ME TO STOP ME FROM DEFEATING THEIR TECHNOLOGY. THE OPERATIVES, ORGANIZED STALKERS AND LOCAL THUGS THEY ARE USING ARE MOVING RIGHT NEXT TO ME TO SHOW THAT THEIR TECHNOLOGY WAS NOT DEFEATED WHEN IT CLEARLY WAS DEFEATED. GO BACK AND LOOK AT SURVEILLANCE VIDEO. THIS IS NOT AN NEVER WAS ABOUT SOME BULLSH!T INVESTIGATION BEECAUSE I NEVER COMMITTED INSURANCE FRAUD.

CIA DIA MAY NOW INITIATE HYPER GAME THEORY TACTICS TO DISCREDIT THIS POST MEANING THEY WONT STOP THESE TACTICS, BUT RATHER INCREASE THEM FOR THE PURPOSE OF FURTHER DISCREDITING ME THE MIND CONTROL VICTIM AND ESTABLISHING GREATER DEGREES OF INDIRECTION AND PLAUSIBLE DENIABILITY.

THIS IS ABOUT TRAINING RESEARCH AND DEVELOPMENT OF MIND CONTROL TECHNOLOGIES.

THEY ALWAYS BASE THEIR NEXT MOVE OR RESPONSE OFF THE VICTIMS LAST MOVE OR RESPONSE (HYPER GAME THEORY).

Posted July2 2016 1655 hrs
Chiang Mai Thailand

Friday, 7 October 2016

I'll be a Cabral, Sankara, Nkruma, and all the others, if that's what it takes


His death at the hands of those he was fighting for is typical COINTELPRO MO

The time has come for me to make one thing very clear, and this should not be viewed as a wish.

Should anything happen to me at this point in time, then there should be no confusion over whodunit.

I have made sure that blame for something happening to me falls on those who have manipulated me into my current position. It will have to do with a contract, made between handlers running the COINTELPRO program in Africa, and those they control.

Here's how I did it.

I mentioned a while back how when a TI. moves house, there is every attempt made to have them know they are still under surveillance.

Little things, like the posts they make to social networking websites such as Facebook, are repeated to them along the way by total strangers, including some of those they can call their new neighbors.

It matters not if they happen to be people who would not ordinarily use social networking websites. There is someone in the area under direct control from the matrix to tell them what to do or say, for a bribe. The point is to make it clear to the target that a lot of people are under control.

I remember mentioning in an article posted before how parents were sometimes forced to use their own children to update me on this state of things. Children are used in situations where it would be too odd for adults to await my passing before blurting out something with the potential to expose their satanic affiliations to onlookers and, in Africa, this can carry a heavy community sentence.

Been through that, and I connect the assault I had at the hands of a police officer last week to that. Pity the helplessness in the situation. Belongs by the territory, perhaps.

Recently, given the fact I live in the servants quarters by virtue, or vice, of construction, they have been using a new avenue for telling me they are still there. It is ... You guessed it, the new noisy, alcoholic kaboyi, as they are called here, or servant, in English.

Every night for the past weeks, he goes out in the evening at a predictable time, returning late in the night, only to blurt out my Facebook posts, and I know this person is too ignorant for the internet.

My conclusions regarding are that the person's going out to get instructed on how to act when he returns.

It's all COINTELPRO procedure, and they have been closing in on the area while my attention was averted, while I was busy making wooden tables.

The worrying thing about how deeply they have extended an arm of control into this neighbourhood is their insistence on isolating the victim from close ones. By influencing those they keep sending to the plot of land, they make it look to me like my relatives are involved, while in reality they are not ... Just in the dark.

In the meantime, players are manipulated into positions where they start viewing me as the enemy, and the only thing that has saved me to date is my not getting into local politics.

I have as such deprived all from finding a reason to treat me a certain way. This, coupled with the truth I am new to the country, has left those who want to paint me in a bad tight with but my posts to social networking sites and Blogspot to go on.

One would think that this is enough to prevent the known tendency of former colonial powers to cause their former subjects to do it themselves. But it sometimes is not.

Case in point is Amilcar Cabral, Chinua Achebe and the horrible accident that left him paralysed from the waist down, most probably causing his self imposed exile to America,

And there are more, so many there are countries where political violence and assassinations related to COINTELPRO ops are the norm. Just Africans doing it all themselves, keeping the imperialist from blame.

Thursday, 6 October 2016

Is It Because They Know Too Much?

I am not one to boast my exploits in the horizontal, but when those voices T.I.s hear sometimes mention "he still got it", right after something has gone down, I realise two things ... 1. I have been under attack there, otherwise they would not be talking like that and 2. They are indeed watching me wherever I am, whatever I am doing and, they understand that I am still the man I used to be, based on some porn eavesdropping they have just done.

Years have passed since I was in a long-lasting relationship because there is always interference from them. I still do hit and runs, less and less of them, though, for fear my heart, exposed to directed energy assaults at that time, may stop.

Also, I have somewhat given up on the ordinary women, choosing to wait for that conscious T.I, lady because I know she will not find it odd that I sleep in a faraday cage and wear a metal cap beneath a hat when out and about, for example.

So, until then, I have to go it alone.

This lonesome existence can play on the conscious. I sometimes get to feel I no longer look my best what with the constant attacks aimed at the body parts that go into the overal looks. But when I catch the attention of some young, good looking female and win, as happens again and again, I know that my shields are working. I am being spared the worst.

I can still look good, after all that I have been through, after all these years, which is more than can be said of a lot of people who are the last beings one would expect to live under a constant barrage of directed energies.

I am thinking here of what Ayn Rand would call "second handers", the ones who go for positions like POTUS (President Of The United States), including their close ones.

May just be me but has anyone else noticed the rapid aging phenomenon with the POTUS? And it is not that the stress of The job does that. We are all under stress, some with the added strain from directed energies, so why should it show more with them?

Take a look at the following before and after photos of the last 3 US presidents, and I should not mention a wife that said goodbye to thongs for diapers in the process.


First inauguration of Bill Clinton 1993


Just 7 years later in 2000.


Dubya's first inauguration 2001


Dubya just 9 years later in 2010

And finally, perhaps most dramatically ...


Obama in 2008


Obama today, just 8 years down the line.

Wednesday, 5 October 2016

There's a New Indie Documentary on Targeted Individuals on Youtube

If there is a problem watching the videos, then just click on the link that follows to be taken to the channel on Youtube where they are hosted. https://www.youtube.com/channel/UCTxfjH3a4_m4Eke9p6Jq1iQ?

I guarantee you that the documentary's the best I have seen over this issue. It is the kind you can pass on to the uninitiated, so called.

The documentary is done by Ese Lebb, a photographer from California.

It's rare to find films on this subject due to the extreme torture the victim's experience, along with the sophisticated tactics used to repress information on this topic.

Watch Ese's videos below:

The Documentary

Chapters 1. Opening Scene

2. Definitions

3. The Vocal Aspect

4. Images

5. Body Shocks

6. Sleep Deprivation

7. A day in the life of a targeted individual.

8. Remote Neural Monitoring

9. How I got in this situation.

10. The night the guys showed up.

http://bit.do/thntgsu

11. Mike Military

12. Blood over degrees

http://bit.do/bod567

13. Ambitions of a Perpetrator

14. The Stack

15. Doesn't He have a job?

16. Mr. President

Interview Section
1. You're not alone.

2. You're not Delusional. http://bit.do/nwspCM

3. Deedee up in LA.

4. How does it work?

Change.org

Petition URL shortened versionhttp://bit.do/Change-org-

Important Supplemental information

http://bit.do/d0381

The Author: in his own words

I am a Targeted Individual ("TI"). I am trying to raise awareness of the subject and combat disinformation. We all want these human rights abuses to end immediately. Please email your targeted individual experiences and testaments to me. You can find my testament on the about page of this site.

A Targeted Individual is a person who is victimized by Organized Stalking and Electronic Harassment ("OSEH").

Organized Stalking is a covert intimidation and harassment tactic based on the principles of COINTELPRO and Zersetzung.

Electronic Harassment is a method of torturing and subjugating someone with EMF weapons a.k.a. Directed Energy Weapons.

...........................................

The sourced document can be found at the link below www.freedomsos.com/blog/new-indie-documentary-on-targeted-individuals