In the Post 9/11 Era, Understanding the Targeted Individual Phenomenon is No Longer Optional
In the Wake of the Attacks on September 11th 2001, the Targeted Individual Phenomenon Exploded Out from Obscurity, as Millions of Individuals of High Integrity, Began to Report Being Stalked by Security-Service Agents, Personnel, Contractors & Affiliates. This Kind of Stalking has Become Known as Gang-Stalking, Organized-Stalking, or Group-Stalking — But The Most Accurate Description is Security-Service-Stalking
Most people experience a great deal of fear when confronted with incontrovertible evidence that unmasks grotesque lies, rogue power-holders within our society have disseminated — through their channels of manipulation and control. This seemingly overwhelming fear response, has been conditioned in us from childhood. The targeted individual phenomenon is among one of the most shocking, painful and disorientating truths that Americans and citizens of all nations of the world need to marshal the courage to confront. It is simultaneously interrelated and equally as radically disturbing as, the systemic pedophilia phenomenon, the systemic geo-engineering phenomenon and the 9/11 false-flag operation. This essay isn’t intended to be read casually, or when one is hurried, nor in a low state-of-mind. What you will read in this essay, and see and hear in the linked videos, will radically shock you and rattle every remaining notion you may still hold on to of the sacred myth of American exceptionalism. You may feel physically sick. You may tear up. You may doubt the worth of the human race. However, if you are vitally alive, what will be clear, is it is no longer an option to remain frozen with fear as millions of innocent people — most of which represent those of the highest integrity and value to society — in the U.S., Europe and most regions of the world are being trafficked into human experimentation programs of slow torture, major fraud and mass murder. All while, targeted individuals’ families, friends and colleagues insidiously are forced into a “trap of agreement” and have “control files” written up and filed about them — based on a fraudulent pretense of association with “a criminal”. This is used as leverage to subjugate them, or turn them into full-fledged targeted individuals themselves, at some point in the future. Then of course, when you zoom out to a macro perspective on the security-service-stalking situation, what becomes very clear is the sadistic social-political momentum and undertow that is created in the broader communities that witness, and are forced to “stand-down” while these stalking crimes occur, serve as a mass trauma based mind-control devise to create fertile ground to perpetuate and expand the holistic globalist criminal business model. In the post September 11th era, the security-service-stalking situation represents a state-of-emergency that requires people from every walk of life — including those with integrity within our intelligence agencies and all security-service organizations — to see through the very fear that arises in the face of such a grotesque problem, and leverage that seeing, to let this fear give wings to your innate evolutionary impulse to evolve to your truest, deepest, most genuine self. The self within you that knows no fear.
The harrowing work of the following high-profile Targeted-Individuals has been invaluable in evolving my understanding of the Security-Service-Stalking phenomenon and has directly shaped the content of this comprehensive essay.
This in-depth essay is intended to be a comprehensive and nuanced report, as well as, incontrovertible proof of security-service-stalking (a.k.a. gang-stalking, organized-stalking, group-stalking or contract-stalking). It’s divided up into five sections:
1: What is Security-Service-Stalking
2: An Expanded Description of the Tactics Used
3: A Description of Electronic-Weapons
4: A Brief History of Security-Service-Stalking & Whistleblowers
5: A Clarion Call-to-Action from John F. Kennedy in 1961
At the end of the first four sections, I have embedded numerous videos from news reports that have been broadcast on the topic, as well as, video interviews and testimonials with a number of targeted-individuals. These video reports illustrate the essay with detailed accounts from security-service-stalking victims who posess truly extraordinary levels of character, resilience, skill and mental lucidity, even in the face of frankly unimaginable emotional and physical trauma. These harrowing accounts are unmistakably genuine and provide a level of proof, of the existence of these crimes, that can’t be communicated in words, statistics or even official legal documents. Some of these videos are very long, especially the interviews and testimonials. It isn’t necessary to watch all, or even most of, the entire duration of each of the long videos, even just 10–15 minutes of each long one will provide a solid glimpse of the credibility and expertise of the reporting victim. Additionally, it isn’t necessary to watch all or most of the collective embedded videos. I have included many to demonstrate the wide range of very credible reports on the matter and to give the viewer a wide selection of video reports to choose from. If you’re very short on time, the essay text alone will provide a solid understanding of the phenomenon. Of course, if you have the time watching all or most of these video reports will provide a deeper level of understanding. Reading this essay should require about 30 minutes, plus any time you devote to watching the videos, and reading former Los Angeles FBI Director Ted Gunderson’s signed affidavit, confirming the existence of the security-service-stalking phenomenon. This legally binding affidavit is embedded in the last section of the essay.
Part 1: What is Security-Service-Stalking
This horrific and extraordinarily illicit phenomenon is most commonly known as gang stalking, organized stalking or group stalking — but the term security-service-stalking provides the most accurate name. Security-service-stalking amounts to a covert, extraordinarily intense and highly organized stalking crime, a multi-layered illicit business plan and a covert tool to psychologically condition the public at large into self-subjugation to the holistic global criminal cartel that has garnered significant power over all the nations of the world. For the sake of understanding the overarching nature of security-service-stalking, it is important to sum up this kind of stalking as simply a business model — as money and the power that comes with it is the driving force of the problem. Most types of stalking crimes are perpetrated solely against a single individual in a largely crude and poorly planned manner by a lone estranged business associate, spouse, colleague, friend or secretive voyeur — that was motivated simply by the desire to fulfill feelings of revenge, straightforward monetary gain, to manipulate a single relationship, to gain a simple advantage in a competitive marketplace or to fulfill a voyeuristic drive. Security-service-stalking by contrast, is omnipresent, highly organized, precisely customized to the specific victim, extraordinarily intense and usually involves physical attacks on the victim’s body via classified military electronic frequency weapons. Additionally, a full spectrum of classified military high-technology tools are utilized and the stalking campaign is perpetrated by large teams of individuals who work in the security-services industry or who culturally associate with these people. This overwhelming, omnipresent and utterly surreal type of stalking is designed to completely decimate the victim’s life and psyche, as well as, extract multiple streams of profit from the victim directly — and as a human experimentation trafficking subject. Moreover, the family, friends, neighbors, colleagues and business partners of the primary victim ultimately all end up being turned into victims themselves and used as sources of profit. This is done via the creation of “control files” that are written up about them under the fraudulent pretense of associating with “a criminal”... Then this “control file” is used as leverage to subjugate them, or turn them into full-fledged targeted individuals themselves — at some point in the future. Finally, through the public spectacle that these campaigns create and the underlying fascist social-political momentum that is generated, security-service-stalking campaigns covertly psychologically condition the public at large in a way that insidiously divorces them from their fundamental human rights and the rule of law and constitution. This creates fertile ground to globally perpetuate and expand the holistic criminal cartel’s power and profit and entrap more individuals into security-service-stalking programs. So security-service-stalking is an all-together, completely different and infinitely more destructive phenomenon than what is normally thought of as stalking.
This kind of extreme state sponsored stalking is initiated by government intelligence agencies and fully deployed via an array of related security-service organizations, entities and individuals including: local police, security contractors, networked law enforcement intelligence units (LEIUs), homeland security surveillance fusion centers, related secret-societies, corporate entities who have relationships with the security-service-complex and hordes of everyday brainless bottom-feeders that could best be described as socially-weaponized-morons. These roaming hordes of morons who culturally associate with these entities, have had all objective discernment conditioned out of their minds, and have been conditioned into, very strict obedience to a fascist cultural mindset. These people thus have been turned into a completely covert and massive expanded network of brainless fascist informants and stalkers seamlessly embedded within society to undermine highly skilled and productive citizens of high integrity, civil society and the rule of law and constitution. Security-service-stalking of an individual involves a customized array of these kind of tactics: blacklisting, surveillance, slander, harassment, street theatre disconcertment skits, subversion of relationships, black-bag home break-ins, sleep-deprivation, workplace mobbing, intellectual property theft, subversion of medical care, financial/asset sabotage, computer/phone sabotage, subversion of mail delivery, staged traumatic events or encounters, criminal framing, staged accidents, the triggering of fraudulent systemic chain reactions; and often also includes, covert physical drugging or poisoning and physical attacks via microwave/EMF weapons, neural-monitoring weapons and RF-microchips that have been covertly implanted in the target. Sometimes classical crimes will also be committed against a victim who is particularly resistant to the stalking including kidnapping, all manner of overt human-trafficking and murder.
Security-service-stalking isn’t new it has been going on for decades, but after the September 11th attacks it has grown from a very serious problem that was perpetrated against hundreds of thousands of people around the world, into a wildly out-of-control and monstrous war — now carried out in an almost unimaginable high-tech extreme against millions of people in the United States, and millions more around the world, of all races, economic classes, social status, professions and level of education. In fact, many very famous actors, writers, musicians, artists, journalists, public figures and politicians have been targeted like John Lennon, Edward Snowden, Randy Quaid, Julian Assange, Rose McGowan, Martin Luther King Jr, Jean Seberg, Kim Dot-Com, Stephen Shellen, Gloria Naylor, Ai Wei, Ted Gunderson, Cynthia McKinney and Suzie Dawson are among just a few of the famous individuals who have been subjected to security-service-stalking… It is perpetrated against people who live their life with a high-level of integrity; people who have a progressive or libertarian political and cultural orientation; people who possess extraordinary atypical talents and potential that is seen by a security-services leader to be a threat to their fascist notions of how society should be run and shaped; people who are sexually attractive to a security-services leader; people who become the victims of medical, police, city or state government fraud — especially if they pursue litigation and activism; people who have an independent and genuine interest in philosophy and spirituality; people who are famous that represent and advance a cultural and/or social-political perspective that is at odds with a security-services leader’s fascist cultural and social-political orientation; people who run a business that is seen as a threat or desirable prey for intellectual property theft to a security-services leader; people who are perceived by a security-services leader as expendable for any number of arbitrary and fraudulent reasons; people who are vulnerable because of a handicap, isolation or poverty; or people who arbitrarily happen to rub-up against a security-services leader amid the course of their everyday life in a way that is perceived to be offensive by this leader.
After the September 11th attacks, all intelligence agencies’ budgets and staff doubled or tripled within about a year, and have secretly merged at the highest levels, and become networked under one global organizational super-structure for most of their activities. Additionally, the passage of numerous laws that suspend citizens’ fundamental rights under the pretense of protecting citizens from terrorists, as well as, extraordinary advancements in technology, internet connectivity and applications have networked and empowered these entities in previously unimaginably powerful ways. To top this off, again under the pretense of protecting citizens from terrorists, entirely new intelligence agencies were created like the DHS (Department of Homeland Security) to further expand the reach of all the intelligence agencies and local police departments have been outfitted with military assault vehicles, assault rifles, electronic weapons and high-tech surveillance gear… This writing isn’t focused on the September 11th attacks, but the fact that security-service-stalking exploded in scale and scope after the September 11th attacks, and the whole “war on terrorists” campaign at home is used as cover to engage in security-service-stalking, is just one more layer of proof that the attacks that day were a false-flag operation that was carried out by globalist power-holders and the public facing politicians that they control. Not that another layer of proof was even needed to discern this truth, as the good people at Architects and Engineers for 9/11 Truth and preeminent researchers like David Ray Griffith, have unearthed very clear and incontrovertible evidence that the three World Trade Center Towers were brought down via controlled demolition — and the only people who would have had the ability to do this would have been a coalition of globalist power-holders and the puppet politicians that they control. The world’s intelligence agencies always engaged in a lot of pointless, illegal and evil activities and programs, but after the September 11th attacks, as their budgets and staff doubled or tripled in such a short period of time and new adjunct intelligence agencies and surveillance fusion centers were funded and staffed very quickly — these entities became, by-in-large, run by clinical psychopaths, weaponized-morons and passive inept-morons. Additionally, these people were given massive amounts of new money and a blank check to roll-out the use of this new power in an omnipresent and systematic manner. As a result, security-service-stalking in synergy with a number of other key post-9/11 dystopian developments, has evolved into not simply a wildly out-of-control problem, but literally a covert asymmetrical worldwide war being waged against all of the worlds populations by intelligence agencies who no longer work for the nations that created them, they are sworn to protect and are paid by — but instead, an illicit and unknown globalist board-of-directors of extremely wealthy clinical psychopaths. Security-service-stalking now literally represents an existential threat to the basic sovereignty of the world’s nations — and life and liberty as we have known it in the second half of the 20th century. So since the attacks on September 11th, we are literally bearing witness to the slow covert overthrow of all of the nations of the world by this unknown, illicit, globalist-psychopath board-of-directors who have covertly ceased the lion’s share of control of all the world’s intelligence agencies and the nations they represent… Security-service-stalking can follow the victim from city-to-city, state-to-state or even country-to-country, all around the world for years. The extreme and surreal intensity of the stalking usually results in the victim committing suicide, becoming homeless, being driven to insanity, dying from cancer or other injuries induced by electronic frequency weapons or becoming disorientated from their natural personality and discernment, thus driven, to commit murder or mass-murder against the people committing the stalking or random people that the victim happens to be incited against by the stalking. Individuals who possess truly extraordinary levels of character, resilience and skill, who become stalked, are often able to survive their security-service-stalking circumstance and rise up to effectively confront their stalking circumstance and become leaders in activism for justice.
The Following Broadcast News Video Segments, All from Mainstream News Outlets, Investigate the Targeted Individual Phenomenon — with Balanced Discernment
Part 2: An Expanded Description of the Tactics Used in
The fundamental tactics used in security-service-stalking campaigns, by the world’s intelligence agencies, and the sprawling related security-service organizations: police departments, law enforcement intelligence units (LEIUs), homeland security surveillance fusion centers, secret societies, security industry contractors and the like are low-tech and follow in the exact same tradition as the stalking tactics used by the infamous forces of radical evil in Nazi Germany and Stasi East Germany. But they have exponentially expanded on these low-tech tactics by leveraging the omnipresent popularity and proliferation of internet connectivity, applications and devises — with a multitude of sophisticated covert surveillance software and hardware. Moreover, sophisticated new research into torture and mind control tactics, developed in the decades since the fall of Nazi Germany, has been used to infuse these stalking campaigns with even more destructive power. Finally, the use of electronic and neural monitoring weapons, in conjunction with, the exponentially expanded traditional stalking tactics — add an almost unimaginable new level of destructive power and control to post 9/11 security-service-stalking campaigns. So what we are witnessing with the post 9/11 security-service-stalking phenomenon, is a covert, global, unimaginably high-tech and evolved manifestation of a Nazi and Stasi German fascist state — being put into place in slow motion under the guise of protecting the world from terrorists.
A person is usually considered to be routed into a security-service-stalking program through someone who has some kind of relationship, or personal contact with, the proposed target — and simultaneously, connections to a security-service leader. Or by a security-services leader himself. Once a person is flagged for consideration to be routed into a security-service-stalking program, usually the first thing that is looked at is the person’s classified NSA file that contains all their cell phone conversations, e-mail communications, online messaging communication, social media communication and website browsing history. The famous NSA whistleblower William Binney disclosed how this initial vetting of a proposed security-service-stalking target is done in detail when he spoke at the 2014 Covert Harassment Conference in Europe.
These sophisticated and complex stalking campaigns, are initiated and managed at the official offices and facilities of the intelligence and security-service organizations, as well as, numerous unofficial locations and in the private properties of neighbors of victims who are conned or bribed into participating in the stalking. These campaigns are so complex, overwhelming, coordinated and persistent, that they are run by large sprawling teams that scale dynamically to the extent of the stalking program specified at any given point in the stalking campaign. To one extent or another, these surreal campaigns are monitoring and/or executing stalking and electronic weapon protocols on the victim 24 hours a day 7 days a week in shifts. The extent of the intensity of the persistent stalking varies greatly in that some victims may only have some sort of basic monitoring of them 24/7 with moderate low-tech stalking antics, disruption of their communications and online activities, as well as, electronic weapon strikes occurring a half dozen times per day. Other victims who are being subjected to more intense stalking programs, may experience moderate to aggressive stalking protocols most every hour of the day including when asleep. One thing is for sure no matter the intensity, any security-service-stalking campaign is devastating to the victim.
In taking a deeper look at the specifics of some fundamental security-service-stalking tactics that are used, it’s clear how omnipresent and devastating security-service-stalking is to victims, communities and society as a whole. The following detailed description of stalking tactics is meant to describe some of the primary tactics that are most often used on targeted individuals — but this descriptive list isn’t by any stretch of the imagination comprehensive because that would take a whole book’s worth of material. Blacklisting: The target will suddenly, or progressively over time, find they are not being invited to social events organized by their usual network of friends, colleagues or within their community. The target is barred from getting most types of work via an array of slander, threats and framing. The target’s name may end up on different types of terrorist or criminal watch lists that prevent or delay travel, make them subject to extraordinary suspicion from police, or prevent them from receiving entitlements or services from the government. The target may find out that false official looking notices, that appear to be from one government agency or another, were sent out to the victim’s neighbors under the pretense of notifying them that the victim is a sexual predator, suspected terrorist or suspected of being dangerous in pretty much any way they want to make up— to manipulate the situation. The target may have trouble hiring contractors, or vendors of all types, or they may be subject to a poor work product or fraud from the people they hire. Surveillance: The target’s database file from the NSA and all other intelligence agencies and security-service organizations is garnered, opened and analyzed. The target’s current and ongoing phone, webcam, email and social media communications are intercepted, monitored and recorded for analysis. The target’s complete medical records are garnered, opened and analyzed — including DNA samples that the government has often secretly collected from newborn babies since the 1960s. The target’s friends, lovers, significant other, colleagues, neighbors and other associates are covertly questioned about personal information about the target. Audio and video bugs are used in the target’s home, via an array of invasive high-tech means. The target’s travels are monitored by video feeds, at surveillance fusion centers, from CCTV cameras located on highways, in shopping centers, colleges, airports, transit terminals, subways, buses etc. The target may have appointments with doctors, counselors, clients, etc spied on through various high-tech bugs or various other means — or through conning, bribing or pressuring these people to record their meetings with the targeted individual. The target may have compromising moments in public places spied on. Slander: Most of the target’s closest relationships with family, friends, colleagues and neighbors will be spoiled, seriously degraded or subverted. Even new relationships that the target attempts to make will be sabotaged with slander. The target’s employer and/or clients will all be subject to a massive slander campaign about the target — and this will almost always follow the target as they try to get new employment or new clients. Harassment: The target will be harassed with traditional German Nazi/Stasi style low-tech tactics, like being followed at a distance and intensely stared-down by multiple low-level street stalkers or neighbors — as the victim walks around their neighborhood or about town. Sometimes these stalkers will also pay or otherwise con people who frequent places that the target frequents, and merchants that the target does business with, to harass the target incessantly with coordinated rude behavior, coordinated derogatory innuendo, coordinated derogatory mind-control programming “memes” — and incessant innuendo implying the target is crazy etc. Sometime these low-level street stalkers or neighbors will engage in what is called “street theatre disconcertment skits”. These skits are acted out with body language/postures, hand/arm gestures or facial expressions that are derogatory, remind the target he is being stalked, act-out compromising information the stalker wants to remind the target that the stalking campaigners know about — or act-out a mock execution of the target. When the victim drives a car he will often encounter, in short periods of time, multiple rude drivers cutting him off, yelling at him, blaring horns, brighting or flashing headlights, when driving at night — or being subject to disconcertment symbolism while driving like being followed when driving by a pair of hearse cars everywhere they drive for a day. If the target manages to keep a job for a while, he will find that at least a few of his colleagues will incessantly harass him in many of the same ways the street stalkers do — and these tactics will often be coordinated, with the low-level street stalkers, to relate to each other or duplicate each other. The target’s colleague stalkers at work, will often engage in framing the target to get the target fired or demoted for bad work that the target wasn’t responsible for. Sometime the target’s colleague stalkers will try to frame the target in a way to make the target look or sound crazy — and then try to force the target to see a psychiatrist while traumatized because of the experience of being framed and the greater stalking campaign. Electronic Frequency Weapon Attacks: Most targets have some degree of these classified high-tech weapons used on them. Targeted individuals who are living under intense security-service-stalking campaigns, usually have very surreal types of Electronic Frequency Weapon attacks directed at them daily. Very few people understand these weapons even exist, much less how they work or the kind of attacks that are possible with them. I go into detail about these weapon in the next section of this essay.
The Following Broadcast and Online News Video Segments, From Well Known Mainstream and Alternative News Outlets, Focus on the Tactics Used In Security-Service-Stalking Campaigns
Part 3: A Basic Description of Electronic/Microwave/Sonic/EMF/DEW Weapons and Remote Neural Monitoring
I have come to understand that these top-secret classified weapons exist, the basics of what they can do, and a tiny glimpse of how they work, through the explanations of these weapons given by whistleblowers like the former Surgeon General of Finland Dr. Rauni Kilde, former intelligence agent Barry Trower, former California State University Stanislaus University Professor Dr. Eric T. Karlstrom and former NASA Engineer Richard Lighthouse. These utterly surreal weapons, fall under various names: microwave weapons, electro-magnetic-frequency weapons, electronic weapons, directed-energy-weapons (DEW), sonic weapons and remote neural monitoring weapons. They are delivered via various covert means and are invisible, silent, odorless and travel freely through most walls. The more advanced variety follow the victim just about everywhere they go 24/7. They are shot through: satellites, repeaters, microwave transmitters, transducers, antenna systems, portable directed-energy devices, ultrasonics, infrasonics, lasers, masers, X-rays and sometimes work in conjunction with covert implants, nanotechnology and virus-filled aerosols. These weapons are used by security-services, in coordination with, low-tech traditional stalking techniques to virtually imprison, incapacitate and ultimately drive the victim to insanity, suicide or murder. Since the attacks on September 11th, electronic weapons also began to be used by security-services to injure, mutilate and disperse crowds of protesters at rallies for progressive or libertarian political causes.
The more simple electronic weapons shoot wide energy beams over relatively short distances that crudely injure and mutilate everyone who happens to be in the path of the beam through radiation damage, internal burning, and imposing painful inner-ear “voice-to-skull” sounds. The more sophisticated electronic weapons, use multiple very narrow energy beams, and sophisticated encoding — that are designed to converge at certain specific points within the body and brain of the victim to create specific effects and injury, as well as, control many aspects of the functioning of the victim’s organs, brain and much of the body. All of these surreal weapons, always inflict radiation damage to the body thus induce cancer every time they’re used on everything in their path including people who aren’t intended to be targeted, animals and plants. They can be selectively calibrated to burn the skin; burn and debilitate select organs; stimulate or control select organs; burn and debilitate joints and bones; control and debilitate the nervous system; stimulate and debilitate glands; slow or speed up hart rates or induce a hart attack; create tinnitus effects in the ear; blur or scramble vision; stream any kind of audio signal to the inner-ear (often referred to as “voice-to-skull”); stream video or images to the inner-eye; stimulate specific regions in the brain to induce specific emotions like anger, fear, sadness or lust; and even impose specific thoughts, sentences or concepts in the brain. The most advanced type of these electronic weapons are the remote-neural-monitoring weapons. These utilize electronic beams that follow the victim everywhere they go and applies a remote and wireless Electroencephalography or EEG via these beams. EEGs and remote/wireless EEGs, read out all the electrical activity of the brain and decodes it to decipher all the victims thoughts and a mapping of the victim’s brain. From very subtle subconscious patterns of thoughts that were developed as a child to move the body and limbs, to more deliberate subconscious thoughts about historical events — to current conscious thoughts about the past, present and future. Even a regular wired EEG that can be applied in most hospitals sound like science-fiction to most people, so these top secret classified state-of-the-art remote/wireless EEGs, delivered through energy beams, are truly and completely unimaginable to the average person. The reality is this technology is real. In the 1970s, when the Mk-Ultra U.S. intelligence agency mind control program came under a public and U.S. Senate investigation, official documents that were publicly disclosed as a result of the investigations explicitly proved that these weapons were already in existence way back then — albeit in a much more technologically crude and limited form. Since that time, the sophistication and sensitivity of the remote/wireless sensors has expanded and evolved dramatically. This in combination with state-of-the-art EEG software, and dramatic increases in computer processing power, have made their 21st century capabilities truly horrifically awe inspiring. Most of the millions of victims reporting security-service-stalking, explicitly describe the use of these electronic weapons in their stalking circumstance. Additionally, most of the whistleblowers who have come forward to warn the public about the problem of security-service-stalking, also confirmed the existence and capabilities of these electronic and remote-neural-monitoring weapons. Additionally, there are U.S. patents that prove the existence of these weapons. Some of the companies that manufacture these weapons even openly advertise their electronic weapons for sale in security-service-industry trade magazines, catalogs and online.
The Following Online and Broadcast News Video Segments, From Independent Journalists, as well as, Alternative and Mainstream News Outlets Focus on the Surreal Electronic Frequency and Remote Neural Monitoring Weapons that Are Used In Security-Service-Stalking Campaigns
Part 4: A Look at the History of Security-Service-Stalking & Whistleblowers
Security-service-stalking follows in the footsteps of the radically evil stalking tactics used by Nazi Germany and Stasi East Germany called, in German, “Zersetzung” (in English it means decomposition). It was first developed in the U.S. after WW2, as the CIA imported over 1,600 Nazi scientists from Germany into the U.S., under CIA “Project Paperclip”. These Nazi war criminals were placed all across the nation in prominent positions of power, after their war crimes records were artificially erased by the CIA, within the intelligence, scientific, medical and secret space program communities. The very first public warning that a massive, paradigm-shifting, false-flag operation and ensuing monstrous stalking phenomenon, would transpire at some point in the future, came from the very highest office in the land — the 34th President of the United States Dwight D. Eisenhower. In his farewell address to the nation in 1961, Eisenhower described how entities had emerged and gained significant unchecked secret power within our government, in the top-secret military, scientific and technological communities. Eisenhower emphatically warned the nation to: “guard against undo influence from the military-industrial-complex” he also warned that: “public policy could become the captive of a scientific and technological elite” Eisenhower continued: “the potential for the disastrous rise of misplaced power exists and will persist”; he further expounded: “we must never let the weight of this combination endanger our liberties or democratic processes”. Eisenhower’s warning to the nation has proved prophetic.
Security-service-stalking was first explicitly outed publicly in the early 1970s by a citizens’ commission, who ran their own clandestine operation, and garnered official top-secret classified documents that proved the existence of security-service-stalking — within the covert CoIntel-Pro intelligence operation and Mk-Ultra intelligence mind control program. The outing of these official classified documents, proved absolutely, that security-service stalking, harassment and mind control campaigns had been in operation against thousands of innocent Americans and forced the intelligence agencies involved to publicly admit this. This original outing of security-service-stalking, also forced a U.S. Senate hearing on the matter, in which these activities were openly talked about in the hearing and admitted to — these hearings were all documented. Unfortunately, the guilty parties involved at the intelligence agencies were given minimal punishment, there was no organizational restructuring of the agencies involved, nor was there any significant measures of transparency or oversight put in place to hold these agencies accountable in the future… So they simply continued to engage in security-service-stalking in a more covert manner under different code-names. When a human organization has fallen under the control of rouge elements within, at the highest levels, that act at the behest of clandestine foreign entities who seek to subvert the intended purpose of the organization — and said organization is completely opaque to the populations that it is supposed to serve — reform of said organization is impossible, even when there is significant public exposure of wrongdoing and serious consequences are rendered against those who are shown to be guilty. A human organization that has fallen into this state of “deep capture” can only be reformed via, extraordinary measures of punishment for those guilty of corruption and a complete reorganization of its human structure, that integrates, enforceable power-checks and balances, as well as, transparency to the populations the organization serves.
There have been a number of individuals with long and decorated careers within the intelligence agencies, at leadership levels, that have left their official positions of power to come forward, and warn the nation and world, since the September 11th attacks — explicitly blowing the whistle on the current security-service-stalking and electronic weapon problem including: Barry Trower, Edward Snowden, Thomas Drake, William Binney, Kirk Wiebe, Karen Stewart, Mark Phillips and Ted Gunderson. Mr. Gunderson, a 30-year veteran of the FBI and Director of the Los Angeles FBI office, even wrote and signed a legal affidavit disclosing his knowledge that security-service-stalking was truly happening all across America and many details about the phenomenon. He did this to help the targeted individual community legally prove that this phenomenon was real. This affidavit is embedded in this essay under this paragraph. Many other leaders in the fields of science, medicine, psychology and the military, who have worked with intelligence agencies, have also come forward since the September 11th attacks to explicitly blow-the-whistle on the current security-service-stalking problem including: Paul Batcho PhD, Dr. Nickolas Begich, Richard Lighthouse, Doug Rokke PhD, Carl Clark, Dr. Corkin Cherubini, Dr. Collin Ross, and William Taylor among many others. Probably the most significant individual within the field of medicine and science to come forward, to warn the world about security-service-stalking and electronic frequency weapons, is the late Dr. Rauni Kilde. She held a cabinet level position in Finnish government in the late 1970s — as Surgeon General of the nation of Finland. Somehow, even though all of these whistleblowers have long decorated careers working in or with the world’s intelligence agencies, have elite levels of education from highly respected universities, and live life with the highest degree of integrity — there has been little coverage of their explosive revelations in the mainstream media nor serious movement towards reform. Even within the independent media, the coverage of their extraordinary revelations has only gained aggressive coverage among the most fiercely progressive and libertarian. However, in 2016 and 2017 some serious positive momentum has been generated through the work of a number of extremely talented high-profile targeted individuals — and two high-profile security-service-stalking campaigns that broke into the mainstream news reporting in a big way.
Embedded Below is the Signed Affidavit — a Legally Binding Written Sworn Statement of Fact — that the Los Angeles Director of the FBI, Ted Gunderson Wrote and Signed, After Working for the FBI for 30 Years, About the Target Individual Phenomenon
Part 5: A Clarion Call-to-Action from John F. Kennedy in 1961
Clearly, my comprehensive writing on the matter, documenting numerous layers of incontrovertible proof, as well as, the embedded broadcast news videos and testimonies, from a number of highly educated and professionally accomplished victims, provides absolute incontrovertible proof that security-service-stalking is a real phenomenon, that represents an all-out state-of-emergency. I will close this essay with a quote from John F. Kennedy’s, deeply prophetic, 1961 Waldorf-Astoria hotel speech.
“The very word “secrecy” is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths and to secret proceedings. We decided long ago that the dangers of excessive and unwarranted concealment of pertinent facts far outweighed the dangers which are cited to justify it. Even today, there is little value in opposing the threat of a closed society by imitating its arbitrary restrictions. Even today, there is little value in insuring the survival of our nation if our traditions do not survive with it. And there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment. That I do not intend to permit to the extent that it is in my control. And no official of my Administration, whether his rank is high or low, civilian or military, should interpret my words here tonight as an excuse to censor the news, to stifle dissent, to cover up our mistakes or to withhold from the press and the public the facts they deserve to know.
But I do ask every publisher, every editor, and every newsman in the nation to reexamine his own standards, and to recognize the nature of our country’s peril. In time of war, the government and the press have customarily joined in an effort based largely on self-discipline, to prevent unauthorized disclosures to the enemy. In time of “clear and present danger,” the courts have held that even the privileged rights of the First Amendment must yield to the public’s need for national security.
Today no war has been declared — and however fierce the struggle may be, it may never be declared in the traditional fashion. Our way of life is under attack. Those who make themselves our enemy are advancing around the globe. The survival of our friends is in danger. And yet no war has been declared, no borders have been crossed by marching troops, no missiles have been fired.
If the press is awaiting a declaration of war before it imposes the self-discipline of combat conditions, then I can only say that no war ever posed a greater threat to our security. If you are awaiting a finding of “clear and present danger,” then I can only say that the danger has never been more clear and its presence has never been more imminent.
It requires a change in outlook, a change in tactics, a change in missions — by the government, by the people, by every businessman or labor leader, and by every newspaper. For we are opposed around the world by a monolithic and ruthless conspiracy that relies primarily on covert means for expanding its sphere of influence — on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day. It is a system which has conscripted vast human and material resources into the building of a tightly knit, highly efficient machine that combines military, diplomatic, intelligence, economic, scientific and political operations.
Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.”
— John F. Kennedy
April 27th 1961 at the Waldorf-Astoria hotel in New York City