CitizensAHT.org now has a store where you can purchase a Membership, Targeted Individual Booklets (now on Amazon for $8.00 free shipping), Brochures, metal caps, Linqstat and frequency generators. All contributions go for support of the TI community, this newsletter, the website and research materials. Help distribute this booklet.
NOTICE: If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email. Please print a copy of this newsletter and any newsletters you wish to maintain. Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.
This is an internet reference newsletter.A link to the original article is provided in the colored title line. Articles are referenced based on the subject matter that may be of interest to victims of civil rights abuses, including electronic harassment and stalking. We claim no authorship, of these references, they are presented for your education and consideration of the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
This Targeted Individual was hit with a Directed Energy Weapon. She is smiling because she didn't know what it was and thought it was kind of cool to have a halo made of light. But then she noticed she had been burned. She took multiple pictures of her injuries. The burn got much bigger than this, it covered her whole back.
[A TI took this photograph with a forward looking camera in her ipad tablet. The cameras in iphones, tablets and androids are infrared so when you are getting struck with microwave, take pictures of yourself.]
This TI was also attacked with a biological weapon. She was infected with something that created the small bumps on her back. A stalker was paid to enter her home and contaminate her personal belongings and her entire house with the carrier substance which may have been some sort of gel which contained the bacteria or animals, usually infectious arthropods like insects or worms which cause Morgellons. This substance was smeared all over her house and personal belongings. She lives in the United States of Corrupted America and so do we. This is happening to hundreds of thousands of people and they are being ignored. Their stories go untold.
The government is attacking its own people with directed energy, biological and chemical warfare and gangstalking. They are causing permanent damage in people. These are LETHAL weapons. In some cases, they are torturing, burning and implanting people with electronic medical implants and in some cases, they are just outright killing people. This is a disgrace to this entire country, to its government, military, universities and authorities of every kind to be involved in this. The US has declared war on its own citizens and is silently and systematically trying to remove them from this planet. This picture needs to go on the headlines of every news outlet in the world to show people what is really happening in their world. If everyone saw it, they may get involved in getting this stopped. They are killing AT WILL as if they had guns and they have been given the order to shoot whoever they want to. Please send it to EVERYONE you can.
WHAT IS ELECTRONIC HARASSMENT?
Electronic Harassment is a New World Order torture method being used by governments (Dept of Justice in US) to control and torture people. People are being struck with beams of energy which cause pain equal to kinetic weapon, guns and knives. Targets are struck by devices like magnetrons, lasers, hand-held microwave weapons, sound weapons and others as well, by satellites, drones, embedded transmitters in infrastructure in buildings, by mobile devices in vehicles and by hand-held devices.
Together, they are all called Directed Energy Weapons, because they are capable of directing energy upon a human body to inflict pain and destruction. It includes a system of medical implants that are remotely controlled by stimulating them to emit frequencies that cause heat, pain and vibration of biological structures. The system is called a Body Sensor Network or Body Area Network. It is connected to the Wifi/Bluetooth internet network. It is illustrated in the picture below. As you can see, the system includes satellites and game playing software. This is the world's first electronic torture implant system. It has the power to take over an entire human from head to toe. It can control the brain and make electronic slaves of humans. Tortured Targeted Individuals are being hunted like animals and are being used as medical experiments as the victims of this remote torture program carried out by the department of justice, fusion centers, police, firemen, first responders, veterans of these agencies, business owners (Infragard) and the ordinary citizen stalkers (Citizens Assisting Police) these agencies employ and train. Recently launched Wifi beaming satellites will help complete the electronic lockdown on human bodies when connected to the GPS/Internet/5G network.
Targeted Individuals receive the main gateway implant in their midsection and a brain radio implant (tuned in left ear constantly). This brain radio is continuously communicating through radio signals (some local radio station band is used now, but 5G will create a continuous ubiquitous connection) and is connected to an AI computer. Brain frequencies are continually transmitting to and from the computer.
Targeted Individuals receive a system of implants in their head that includes an implant on the cochlear nerve where signals go directly to the brain and bypass the ears. The system includes an implant in the eyes that communicate what they see to the computer. The system has implants in the sinuses, bones of the face, the jaws and the throat. The victim can be made to hear things other's cannot. They also make sounds which they do not make themselves, the sounds come from the throat implant. There is also technology that goes around the throat that could enable you to be strangled at will. They receive implants in literally every part of their bodies, from head to toe so they can be manipulated with signals to their senses, nerves, muscles which take over the movements and use of their bodies. This is called Total Human Surveillance. The implants are stimulated remotely, using relays of electronic signals through transmitters hidden in structures and objects in the home, car and city infrastructure. A beam of energy turns on the implant. It either heats up your flesh, vibrates, itches, tickles or burns you. Some implants dispense drugs. Deep implants in joints make holes in the bone. Implants attached to nerves wear out the nerve to kill it. Continuous heating creates tumors. Implantation creates a slave who is tortured to death.
The main implant is a computer called a Gateway that communicates with the other implants. Your RFID chips contains all your private information. It is already installed in possibly 300,000 people in the US alone through a covert secret medical implant program. Your RFID chip can be read by anyone with an RFID reader. Your local police and fire department participate in coordinating strikes. THIS IS NOT HEALTHCARE. THIS IS ILLEGAL MEDICAL SURVEILLANCE. The government program calls it "Medical Security." It is not for the victim's benefit. These people have been secretly implanted with an RFID chip that will be in their bodies until they die. They can be read even from the grave. Long term studies show implants always cause tumors and destroy delicate tissue (in the brain) so implants will cause medical complications. This main computer is connected to the Body Sensor Network and relays all the information on the computer through the internet. It is intended for the PUBLIC, as shown in the wording of HR 3962. It will be read by employers, doctors, bankers, realty personnel, people who have the power to keep you from living your life and everyone who gains access to the access numbers, i.e., every drug dealer and stalker.
TI TESTIMONY 1
[Comment for everyone: Put your tongue on the roof of your mouth as far back on the left side as you can and feel for a little lump in the place where you see this object. It has been found that many people have this. Thanks Martin, a TI in California for bringing this to our attention.]
To the left is an implant in my jaw, taken 2013 in Ohio. The jaw implant appears to be some military transformer. Of course, there are many more.
On Feb. 19, I had a total knee replacement revision on my right knee. The bone was deliberately shaved by laser to cause the knee revision to be a must. Copies of x-rays and CT-scans are below. I can't put any weight on the new knée joint for 6+ weeks. The damaged bone had to be amputated and a steel rod put in its place. And even after forcing me to surgery, I'm not allowed to get enough sleep to recover well. My handler the cruelist sociopath with his arrogant demonic demeanor. With ALL my evidence, law enforcement sits quietly by and allows the abuse to continue.
Left: Knee x-rays of right knee after bone assaults.
Right: CT-Scan of heart showing
chip in soft tissue, taken 2012.
This diagram to the left is what is prepared by ___________ during her testing with various devices to read for implants within the body. She prepared this diagram showing that she found implants emitting frequencies from these areas on my knees, lower legs and feet.
PARKLAND, Fla. (INTELLIHUB) — Many credible sources, including students, parents, and teachers of the school have openly admitted on camera that they were told at one point or another prior to the Valentine’s Day shooting that a “code red” active shooter drill would be taking place.
Stoneman Douglas H.S. Freshman Kelsey Friend told CNN on Thursday, that she heard whispers from fellow classmates on the day of the shooting that police would be conducting an active shooter drill using “fake guns.”
Friend, who seems traumatized, told CNN that her and her classmates were whisked to safety when SWAT made their entry and evacuated them over an hour later.
Another student told a Texas News station that she saw “weird dust on the floor” after shots were fired and admits that drills were being conducted on the day of the shooting.
“It was pretty terrifying because they were all putting us through drills — we thought this was a drill but it wasn’t and then we just started hearing gunshots,” another student told KPRC 2 shortly after the shooting.
And if that’s not enough, the student said that there were “three shooters” and described one of them as “some other kid” (as in, not the suspect, Nikolas Cruz) and gestured as if the person she saw was wearing a tactical vest and a mask.
Gunpowder residue and wadding is often expelled in great quantities when blank rounds are fired. So, the question is: Who took the drill live? Who fired live rounds?
Where in the world are your RFID tags? Do you have a "USDOD-64" "Filter", "Government Managed Identifier","Serial Number"?
RFID Tag Finder will help you rapidly locate those hard to find tagged items. It is one of a series of apps designed for ASCII2-compatible, Bluetooth® UHF readers from Technology Solutions (UK) Ltd.
Using responsive, audible, signal-strength feedback and a dynamic graphical signal meter RFID Tag Finder allows you to rapidly sweep large areas and hone in on just the asset you are looking for. Alternatively, configure Tag Finder to only detect when the asset is very nearby - allowing rooms full of cages, boxes and racks to be rapidly and efficiently searched.Using the built-in, default configurations or a fully, user-specified operation, Tag Finder can be optimized for your asset environment.
RFID Tag Finder can be configured for tags encoded using:
∙ SGTIN-96 ∙ GRAI-96 ∙ ASCII ∙ Hex
To make life even easier all the necessary encoding configuration can be achieved by simply scanning an RFID tag in the desired format.
The target asset identifier can either be entered manually or be scanned from a barcode.
SGTIN-96 encoded assets can be specified using GS1 standard identifiers such as GTIN-8, GTIN-12 (UPC), GTIN-13, GTIN-14 or simply using the Item Reference number.
GRAI-96 encoded assets can be targeted using GRAI codes or plain asset types.
With Hex or ASCII encoding selected a useful, in-built tag scanning screen generates a list of nearby tags, ranked by signal strength to quickly provide a target identifier when demonstrating or familiarising yourself with the operation of the App.
Technology Solutions (UK) Ltd (TSL) specialises in the design, development and manufacture of Radio Frequency Identification Devices (RFID) and other multi-technology mobile device peripherals that are used to track products, assets, data or personnel. RFID devices are typically used in transport logistics, stock inventory control, and collection of personal data and attendance.
RFID Tag Finder uses TSL's sophisticated, parameterised, ASCII protocol which provides developers with a powerful set of commands to carry out complex UHF RFID transponder operations in a simple, easy to grasp way. Using these simple pre-configured ASCII commands, any TSL ASCII2-compatible UHF RFID reader can be rapidly integrated into applications resulting in un-paralleled levels of productivity.
Detailed information for supported RFID tag formats. Use with the TAGREAD and TAGWRITE commands.
Fingerprint supports the tag formats listed in the next table. For specific format information, click the format name:
On 31st of July 1997, the United States Patent and Trademark Office granted to four inventors a patent for “Personal tracking and recovery system.” An excerpt of the abstract of the patent reads as follows.
“Apparatus for tracking and recovering humans utilizes an implantable transceiver incorporating a power supply and actuation system allowing the unit to remain implanted and functional for years without maintenance.”
The patented device can be used as a safeguard against kidnapping and to facilitate prompt medical dispatch in the event of heart attack or similar medical emergency. The patent was an indicator for the approaching application of human-implanted RFID chips.
On 24th of August 1998, Professor Kevin Warwick became the first human being to be implanted with an RFID chip. The transponder implanted into the hands, allowed Professor Warwick to interact with “intelligent” buildings. For example, by using the transponder, he was able to open doors that previously required smart card access. He was also able to turn on lights simply by entering into the room. Professor Warwick carried the implanted device for nine days. He stated that in future experiments, the implants needs to be placed “nearer to the brain – into the spinal cord or onto the optic nerve, where there is a more powerful setup for transmitting and receiving specific complex sensory signals.”
In 2002, Wired Magazine stated that Nancy Nisbet, a Canadian artist, implemented RFID chips into her hands. Ms. Nisbet purchased the chips from a veterinary clinic. The chips were normally used to identify livestock and pets. Nancy modified her computer mouse to incorporate a scanner to pick up the signals emitted by the transponder. Thus, she was able to monitor her Internet use. Nancy stated in relation to her implant, “It’s a way of connecting physical and virtual space and tracking my relationship with my computer.”
In 2004, the U.S. Food and Drug Administration (FDA) approved the use of VeriChip, a human-implantable microchip. VeriChip was normally implanted between the shoulder and elbow area of an individual’s right arm. When scanned by a detector, VeriChip sends to the detector a unique 16-digit number. The number can be linked to information about a user stored in a database. The information in the database may include, for example, identity information and medical records. The insertion of the device is done by a physician who uses local anesthetic. The manufacture of VeriChip was stopped in 2010.
It should be noted that the FDA discussed the potential risks to health associated with VeriChip. In a document published in 2004, the FDA stated as follows.
“The potential risks to health associated with the device are: adverse tissue reaction; migration of implanted transponder; compromised information security; failure of implanted transponder; failure of inserter; failure of electronic scanner; electromagnetic interference; electrical hazards; magnetic resonance imaging incompatibility; and needle stick.”
In 2004, the owner of a nightclub in Barcelona, Conrad Chase, started offering implanted chips in his nightclub. By using the implanted chips, the customers were able to pay for drinks. Simon Morton, BBC Science producer, implanted the transponder offered by the nightclub. In relation to the pain of the insertion, Mr. Morton said, “Having the chip inserted was a breeze, no real pain to report of.”
The U.S. Department of Justice Office of Justice Programs (OJP) has been directed to implement or oversee programs and services that are of specific interest to SAAs. Established by the Justice Assistance Act of 1984 and reauthorized in 1988, OJP provides federal leadership in developing the nation’s capacity to prevent and control crime, administer justice, and assist crime victims. OJP provides innovative leadership to federal, state, local, and tribal justice systems, by disseminating current knowledge and practices and providing grants for the implementation of these crime fighting strategies. Because most of the responsibility for crime control and prevention falls to states, cities, and local units of government, the federal government can be effective in these areas only to the extent that it can enter into partnerships with these entities. Therefore, OJP does not directly carry out law enforcement and justice activities and related services. Instead, OJP works in partnership with the justice community to identify the most pressing challenges confronting the justice system and to provide information, training, coordination, and innovative strategies and approaches to address these challenges.
Implement national and multi-state programs, provide training and technical assistance, and establish demonstration programs to assist tribal, local, and state governments and community groups in reducing crime, enforcing local and state drug laws, and improving the function of the criminal justice system.
Collect, analyze, publish, and disseminate statistical information on crime, criminal offenders, victims of crime, and the operations of justice systems at all levels of government. Enhance the quality, completeness, and accessibility of the nation’s criminal history records system.
Sponsor research in crime and criminal justice and evaluations of justice programs. Disseminate research findings to practitioners and policymakers.
Support the development, testing, evaluation, adoption, and implementation of new and innovative technologies and techniques to support and enhance law enforcement, courts, and/or corrections options.
Provide national leadership, direction, coordination, and resources to prevent, treat, and control juvenile violence and delinquency; improve the effectiveness and fairness of the juvenile justice system; and combat the problem of missing and exploited children.
Enhance the nation’s capacity to assist crime victims and provide leadership in changing attitudes, policies, and practices to promote justice and healing for all victims of crime.
Provide targeted federal leadership to help tribal, local, and state governments advance and sustain public safety at the local level through the leveraging of both technical and financial resources and the development and implementation of community-based strategies.
Tiny ways to find out more about the stalking program near you. Ask to see training documentation for the Neighborhood Assist Programs for your city. This award wall plaques for service by stalkers.
Imagine what an organizational chart of the Electronic Harassment and Organized Stalking Program would look like. It would have the Department of Justice at the top and the boys with the bulging backpacks, backward caps and phones at the bottom. In between is the communication of data about you, a plan for your harassment, methods and tools that will be used on you, a history or what has been done to you so far, what has worked to further their goals, what their goals are in terms of physically degrading you, such as, "destroy the connective tissue in her shoulders so she will eventually not be able to use her arms." This is a reality. Real people are making plans to destroy your body parts. They have teams to discuss an individual and what will be done to them.
Who is doing this, what is their organization, who are the team leaders, who makes daily decisions on which implants to stimulate? What is the theme of the week? Are they going to cause pain in your knees so your knees will eventually have to be replaced or shall it be the hips?
Starting from the lowest level, the street stalker seems to get a notice by phone, a vibrating phone, they answer their phone, they start punching buttons. Or they might be ready for you upon your arrival at a location because your handler has predicted where you are going and sent a message to whoever is at that location. Just because they are already there when you arrive, does not mean they could not be your stalker. They aren't going to call people at home in bed and have them drive where you are, they are going to contact someone already there. So its most likely to be someone who is already in place. Who is your handler?
Since this is a community-based program, this person would be someone in the area. A contractor who specializes in conducting surveillance is the most likely person. In fact, if you talk to your stalker and they realize that they are also being surveilled, they might admit they work for a contractor. Some are intellectually challenged and you might try to take advantage of that and ask question in such a way to get information they don't realize they are giving. Who is the handler who contacts your stalker when they want to do something to you? Where are they located? How do you locate independent surveillance contractors? Are they in the phone book? If they are working with the Dept of Justice, they would have government contracts right? Government contracts are public information aren't they?........ Is there a way to find out who is under contract?
They are the ones who call the police officer closest to you and tell him to drive by you at 60 mph in a 45 mph zone and zap you (implants come on) as they go by. They are the ones that contact the grocery store reading your RFID chips and tell them to have their employees ready with their phones to follow you around the store if they failed to connect you in the parking lot. They tell the managers to display themselves. They tell the bag boy to get ready to place himself unusually close to you when you are to concentrated with paying your bill that you won't notice he has snuck up behind you and place his phone at your hips and is recording your biofrequencies so your implants can be programmed for injection the next day while you are sleeping or programming already implanted devices.
How do you find these secret people conducting secret operations on you? Could you start with funding? Who pays the bill for this? Its community based so it goes through the city grants, grants to the police, firemen and medics. Is this a place you could start to research who in your community has been hired to harass you? What grant is paying for the gift cards? Who administers the grant? Could you get a copy of all government grants that are active right now?
You can get a list of people who work for the city, police, firemen and medical personnel. Why can't you get a list of people doing volunteer Citizens Assisting Police or working in the COPS program? Would these people be protected from disclosure? These are your stalkers. They won't be on payrolls. Their gift card income is most likely tax free so there would be no record of FICA or withholding from paychecks.
The Citizens volunteering would most likely be discoverable, either by FOIA or simple request. How would they deny you access to the people they have hired? The program includes a recruitment process, an evaluation process, training, practice and start date. There would be forms to fill out by the applicant, non-disclosure agreements and training manuals that could be requested by FOIA. According to one stalker, they have parties, picnics and luncheons where they invite all their program members to gather and associate for lunch and drinks. They have ceremonies where they hand out awards, plaques and gifts. They have swearing in ceremonies. They have names for the people in the program such as the "Eagles."
By requesting documents, funding and expenses documents for CAPS and COPS programs, this veil of secrecy and abuse might be lifted. But...it would leave you exposed to revenge stalking, more torture. Would it be worth it? You decide.
Volunteer Programs Enhancing Public Safety IACP supports law enforcement professionals with a wide variety of services. It conducts management and operational studies; presents state-of-the-art training programs and materials; establishes law enforcement policies and procedures; publishes a professional monthly magazine and special reports; and conducts extensive law enforcement research. U.S. Department of Justice Office of Community Oriented Policing Services 1100 Vermont Avenue, NW Washington, DC 20530 (P) (800) 421-6770 email@example.com www.cops.usdoj.gov The Office of Community Oriented Policing Services (COPS Office) was created pursuant to the Violent Crime Control and Law Enforcement Act of 1994. As a component of the Justice Department, the mission of the COPS Office is to advance community policing in jurisdictions of all sizes around the country. COPS provides grants to tribal, state, and local law enforcement agencies to hire and train community policing professionals, acquire and deploy cutting-edge crime-fighting technologies, and develop and test innovative policing strategies. COPS-funded training helps advance community policing at all levels of law enforcement – from line officers to law enforcement executives – as well as others in the criminal justice field.
Citizen Corps Department of Homeland Security Federal Emergency Management Agency Community Preparedness Division 800 K Street, NW Suite 640 Washington, DC 20472 firstname.lastname@example.org www.citizencorps.gov
The mission of Citizen Corps is to harness the power of every individual through education, training, and volunteer service to make communities safer, stronger, and better prepared to respond to the threats of terrorism, crime, public health issues, and disasters of all kinds. Citizen Corps councils help drive local citizen participation by coordinating local Citizen Corps programs, developing community action plans, assessing possible threats, and identifying local resources. There are five Citizen Corps partner programs: Volunteers in Police Service, Neighborhood Watch, the Community Emergency Response Team Program, the Medical Reserve Corps Program, and Fire Corps. The Citizen Corps Affiliate Program partners with programs and organizations that offer resources for public education, outreach, and training; represent volunteers interested in helping to make their communities safer; and offer volunteer service opportunities to support first responders, disaster relief activities, and community safety efforts. Citizen Corps is coordinated nationally by the Department of Homeland Security’s Federal Emergency Management Agency.
TI PROVIDED INFORMATION
From a TI:
Below is a random comment from an anonymous source, which I found several years ago in the comment section of an older blog written by Lynnae Williams, a young, promising DIA and CIA employee. According to this Daily Beast article, "Lynnae Williams: The CIA Spy Who Tweets": "Williams’s main grievance with the agency revolves around her termination. Williams says that as a trainee in the agency’s national clandestine service, she was sent to Dominion Hospital, a public mental-health facility in northern Virginia." After getting out of the hospital and then leaving the CIA, Lynnae began getting stalked by groups of men who looked like former college and NFL football players, whom Lynnae believed were F.B.I. agents. (And I think she was right, as I saw many photos of them around her, all over the place, in her older blog.) I didn't look too hard, but I couldn't find Lynnae's older blog. This comment describes the theoretical underpinnings of our harassment protocol(s) and how FBI's InfraGard, DHS's Citizen Corps, and local neighborhood watches could be mobilized—with Multi-Jurisdictional Task Forces also helping to coordinate intelligence agencies, branches of the military, joint terrorism task forces (JTTFs), state and local law enforcement, private security/defense contractors, local private investigators, and private companies—with all of these 'entities' getting marching orders ultimately originating from the approximately 80 State Data Fusion Centers. Information on Program from an Anonymous source “For folks who are interested in this subject, the strategy is actually kind of cool. Any successful implementation relies on three key factors. One linchpin, excuse the pun, is an old form of Japanese torture -- death by a thousand cuts. The second key component is plausible deniability. The third is an effect that is known by many names in the psychological literature -- grounding, stimulus /response, anchoring, where the idea is to associate an otherwise innocuous auditory or visual stimulus with stress. [NLP - Neuro-Linguistic Programming]
Stress triggers a release of a hormone called cortisol, which is associated with the fight or flight reaction. It is an evolutionary mechanism that kicks in as a sort of last resort. Studies on rats and mice indicate that chronic stress, however, is detrimental to higher level cognitive function. The response bypasses the neocortex, and the release of cortisol enhances the creation of memories of short term emotional events, raises blood pressure, and has some interesting anti-inflammatory effects. noun (plural neocortices | -ˈkôrtiˌsēz | ) Anatomy a part of the cerebral cortex concerned with sight and hearing in mammals, regarded as the most recently evolved part of the cortex. Long term exposure to cortisol, damages nerve cells in the hippocampus,the elongated ridges on the floor of each lateral ventricle of the brain, thought to be the center of emotion, memory, and the autonomic nervous system. resulting in impaired learning and memory retrieval of already stored information. The cumulative effect is to try to effect a psychological condition that is often referred to as PTSD. The short term goal is to try to make the subject paranoid both to discredit her in the eyes of the public and more importantly undermine personal sense of center.
As with enhanced interrogation, the tactics all rely on bombarding the subject with stimuli that he or she can't process, and at the same time, to limit normal stimuli and modes of activity.
Of course, knowing that stress can affect long term damage is not enough. From an implementation perspective in a relatively open democratic society with laws against most obvious types of harassment, it is much more difficult to pull this off than in, say Soviet Russia. This is where the 'death by a thousand cuts' strategy comes into play. The goal is to expose the subject to a constant barrage of small nuisances that individually are perfectly legal and bearable, but over longer periods of times amount to psychological intimidation. Each of these smaller nuisances can be as something trivial as tailgating the subject, shouting at the subject for no apparent reason -- and other various forms of street theater.
The beauty of this is:
1. Most of these nuisances can be easily executed in a manner suitable to plausible deniability. 2. If the subject actually tries to relate what is happening to her on an ongoing basis -- she will be deemed paranoid, delusional, schizophrenic, etc.
The logistics for such an information operation appear prohibitively expensive at first blush. One should think it pretty expensive to hire a group of goons who keep stalking the subject for a prolonged period of time. In practice, it is actually not that difficult. For one, the strategy is to rely on an army of useful idiots – each of whom is told a suitably nasty story about the subject – and is told to keep their eyes open. Second -- as with supply chain management the implementation can be outsourced and automatized through some pretty simple software solutions. Again, one balks at the logistics of tracking the subject. In practice, the subject has helped the information operator solve that problem by carrying a cellphone in her pocket.
The overall implementation will then look as follows. Using a variety of means -- gain access to cellphone/tower communication for the subject. Write a simple app that keeps track of a few dozen do-gooders who are either paid for this or provide their services for free, and the location of a subject. Every time that the subject comes within a radius of a mile or two of the operator, the server sends a message to the 'good Samaritan' with a picture of the subject and a choice of customized/personalized strategies for annoying the subject. Upon successful completion, the good Samaritan is able to submit feedback through his cellphone app back to the hq. Each couple of days/weeks a specialist back in hq sifts through the feedback and comes up with new personalized handling approaches which are put into the system.
By virtue of crowd-sourcing, a bit of disinformation, and off-the-shelf cellphone tracking solutions you have yourself a pretty effective 'cocoa puff,' or 'psychic bunny' (an industry/IC term, actually) management solution that rivals the old school KGB, and that for a few hundred bucks tops maintenance per week. What is there not to like about the information revolution, folks? I am sure there are actually quite a few enterprising chaps in this game already. If anyone has any idea as to the ROI for such a business plan, I would really be interested in hearing from you. Also, if anyone is looking to hire developers to implement the game, please let yours truly know. Namaste.” [End of Comment]
A violent weather event snaps more than 100 trees in Washington’s Olympic National Park.
At a Glance
More than 100 trees mysteriously fell in Olympic Park on Jan. 27.
A Seattle meteorologist is trying to figure out what happened.
A meteorologist in northwestern Washington is trying to solve a meteorology mystery surrounding a massive tree fall in Olympic Park.
More than 100 trees fell in an area on the north side of Lake Quinault on the Olympic Peninsula just after midnight on Jan. 27. Cliff Mass, a Seattle meteorologist and professor of atmospheric sciences at the University of Washington, is trying to figure out why.
According to a two-part post he wrote for his blog, Cliff Mass Weather and Climate, early reports seemed to indicate that a microburst was responsible for the tree fall. Mass became skeptical that winds from a microburst would be sufficient to topple the large trees, particularly since some fell while others were snapped at the base of the tree.
"I spoke to Logan Johnson, meteorologist in charge, at the NWS Seattle Office," Mass wrote. "He suggested that to snap off such big trees would take winds of at least 70-80 mph. Maybe more."
Mass noted that at the time the tree fall occurred, radar indicated that there was "no hint of instability and thunderstorms" typical during episodes of microbursts, defined by the National Weather Service as "a localized column of sinking air (downdraft) within a thunderstorm and is usually less than or equal to 2.5 miles in diameter. Microbursts can cause extensive damage at the surface, and in some instances, can be life-threatening."
Interestingly, the tree fall was picked up as seismic activity, helping to confirm the timing.
"At 1:26 a.m. that morning there was a lot of activity ... and no tremors were noted at other regional stations," Mass wrote. "Dr. John Vidale (a former Washington state seismologist) suggests that it may represent the tremor produced by huge, falling trees. Fascinating. More evidence for the timing."
ARE YOU BEING EXCLUDED FROM THE HUMAN RACE? By Everyone? What do the perps want to achieve?
What are some of the effects of being hated?
Inherent sense of badness and worthlessness
Long-term self-hatred and self-loathing
Loneliness and Isolation
Sadness, emotional pain, emotional scars
Self-injury, self-destruction, and suicidal behaviors
The Psychological Effects of Feeling Excluded
If you’ve ever been left out and excluded in a social situation, you’ve been ostracized. It’s a common human experience, happening as often as once a day or more, but it’s not any fun. It doesn’t even have to a close friend or family member to sting—it can hurt even when a stranger excludes us.
Research in social psychology has investigated the impacts of this common unpleasant experience. What does it feel like to be ostracized? What do people do when they feel excluded? Let’s look at just some of what these studies have found.
Feeling Excluded Hurts…Literally?
If you feel excluded, you might say something like “you hurt my feelings!” But when you say “hurt,” you obviously mean it metaphorically…or do you?
Emerging evidence in neuroscience has suggested that the physical feeling of pain (from, say, stubbing your toe) and the social/emotional feeling of pain (from ostracism) overlap in terms of how your brain processes it. That is to say, the same area of the brain that we know to be involved in processing physically painful feelings—the dorsal anterior cingulate cortex—is also relatively active when people have just been excluded.
Further evidence has shown that taking acetaminophen (the active ingredient in Tylenol)—a common pain reliever—was capable of reducing feelings of social rejection over a three-week period, compared to placebo. Once again, as far as your brain’s chemistry is concerned, feeling ostracized seems a lot like experiencing real physical pain.
Feeling Excluded Hurts Psychologically
Obviously, being socially rejected and stubbing your toe aren’t exactly the same experience. Lots of research has established that even a brief experience of being rejected by a total stranger can make people feel sad and angry.
Even more than these negative emotions, though, feeling left out can mess with some fundamental psychological needs. For one, people feel a reduced sense of general belongingness after experiencing rejection. This is a big deal because psychologists argue that achieving a sense of social belonging is afundamental psychological need.
It would be bad enough if ostracism just reduced feelings of belonging, but being rejected can reduce self-esteem, a sense of control, and a sense of having a meaningful existence.
What’s more, these negative reactions seem to apply regardless of who’s rejecting you. Whether it’s someone in your own group or someone who you don’t relate to, ostracism stings. Whether it’s a human or a computer who rejects you, ostracism stings. Even if you think the person who’s rejecting you is someone you despise (like a KKK member), ostracism still stings!
So regardless of who might reject us, that feeling of being excluded produces a range of harmful consequences. I think we can agree that these aren’t great outcomes. So what do people do in response to these feelings?
People Look to Be Included Again
If feeling left out makes you feel reduced social belonging, the natural thing to do is try to make social connections again. After all, you should try to restore what seems missing. A whole bunch of research has shown that this is what tends to happen.
As a simple illustration, one study found that people who were made to feel social rejection went on to express greater interest in making friends than people in control conditions. Similarly, after feeling social exclusion, people are more interested in working on a project with a partner rather than on their own, compared to people who weren’t feeling excluded.
In addition, people who have been ostracized are also better tuned to social information, more likely to conform with a group, cooperate with other people, and nonconsciously mimic a stranger (which helps establish greater rapport).
The Exclusion Conclusion
It’s clear that ostracism is a critically important concept in social psychology. I’ve written before on this blog about how important social connection is—many say it’s fundamental. So interrupting that connection can be damaging in many ways. This review is just one part of all the work that has been done. Other work has shown how people lash out with aggression in response to feeling ostracized, how rejection can impair people’s self-control, and psychologists have also considered the long-term effects of persistent social exclusion.
These effects are important to consider, especially in the domain of bullying and other everyday cases of exclusion, so keep in mind these negative impacts ostracism can have before cavalierly excluding a friend or stranger.
Part of healing from trauma involves healing from that self-hatred.
Survivors may not be able to change the behaviors and actions of their perpetrator parents or any other abusers that have acted criminally towards them, but survivors can learn to separate themselves from such hateful people. It will take working with all the parts of the internal system, but then again, remember that healing for all the inside parts is important.
Learn to separate who did what, and what belongs to whom.
The person that committed the hateful acts is the creator of the hate. That negativity belongs to them. Hateful people can project their own feelings of hate onto anyone around them. As survivors become old enough to think through the emotional process of their abuse, they can begin to build emotional protection around those kinds of hateful attacks.
Let the hate belong to the ones that sent it.
Don’t take it in, don’t claim it as yours, and don’t let it apply to yourself.
Picture a strong emotional, spiritual shield around you, and let that protect you from the barbs of the haters. Hold tight to your own feelings of kindness, compassion, caring, gentleness, and know that your own ability to love and to connect are coming from a different place than hatred.
Recognize that your ability to genuinely care for your loved ones is proof in itself that you are not to be hated or considered worthless. Your ability to feel genuine kindness, gentleness, patience, and compassion prove that you are a good person, completely different and separate from the haters.
The haters will always be haters. Unless they work on their own deep-seated self-hatred, they will always project hatred onto others.
But you don’t have to accept yourself as a rightful target of their hatred. You don’t have to be one of them. You don’t have to shove hatred in the face of everyone else, and you don’t have to internalize it within yourself.
You can be different from that.
Let the hatred belong to the ones that it came from. Give it back to the abusers and let them own it for themselves. Don’t contain that for them. You don’t have to accept their hatred as yours when it came from them.
Spend your time in life doing things that you enjoy and let you genuinely feel better about yourself. Connect with the people and animals that you care about, and build bigger boundaries and stronger separations from the people that treat you with hatred.
Give positive time and pleasant experiences to the people around you, and let your own behaviors define who you are.
Be a good person, and let the very fact that you are choosing good, positive behaviors define to you that you are not that hated person you once felt you were.
If you want to be a good person, you can be. You are not who your haters say that you are. Let their nasty ways belong to them. You can be someone very different from them.
The Florida Group now has their own page at CitizensAHT.org. Please see this page for resources that TI's might need.
Florida Call and it will be at freeconferencecall.com. The new number is: (515) 739-6265; Access Code 272676. The next Community Call will be March 1 at 6:00 pm ET and every two weeks from that time forward. - Sue, Sarasota, FL
TI's: Class Action Lawsuit
Christi Duncan (a TI victim) is looking to organize a class action for victims of electronic harassment and organized gang stalking. If anyone is interested in working with her on this or being involved she is asking that you email her directly at Christi.email@example.com. She has almost 100 people involved with her on this, but looking for more. The idea and hope is to combine efforts of those like Spencer Carter and others who are taking on similar initiatives. Please help spread the word. We have lots of great motivated people working on this!
ACTIVIST: Mike Mason
CONFERENCE CALL: Oregon TI's
OREGON CONFERENCE CALL Saturday March 3, 2018 12:30 PM Pacific Dial-in number: 515-739-6045 Access code number 874647 On Free Conference Call This conference call is for all those targeted in Oregon. Please participate. Amy 971-207-3401
Freedom for Targeted Individuals International Call: Every Saturday we invite you to join us for Freedom for Targeted Individuals International Podcast * To call in Internationally, use your country's international call in number first (link), after the automated prompt, you enter 541.275.1131# www.freedomfortargetedindividuals.org Starting at 3 pm EST/ 12 pm PST 1.541.275.1131 (no pins required) International Dial -in Numbers To join online https://www.uberconference.com/tiangel201
Ella Free's Podcast
Tuesdays & Thursdays
Beginning at 9 pm EST/ 6 pm PST, you can join us live by calling into 724.444,7444, enter ID 141476#, then 1#
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter.
Citizens Against Harmful Technology Inc. • P. O. Box 000000 • New Smyrna Beach, FL 32141