Effects of Electronic Attack and Data Manipulation

I was just trying to write a blog today when my whole page. Curious problem eh?

I will be briefly recommend:

www.psychologicalharassment.com

"The Soft Cage" - Christian Parenti. - You will be amazed at the way that your data is manipulated. If I say that I have spent 25 years in the software industry and was surprised that might help. It would be good that while reading this book you researched the concerns of the ACLU about data manipulation in 2008.

I have had nauseas and nightmares in two opportunities in the last two weeks due to the intensity of the electronic harassment, which was changed during the evening. The death threats go on. People in the street - and this is a very quiet place - once in a while play violent songs. But for the first time some of the people that I have come across are human in their behavior and have treated me well. First time in a lot of times.

One of the most contradictory elements in what is happening to me is that everytime I describe these actions it is consider that I am a mental cause. Only after reading some of the articles of the site mentioned above I started to understand the complexity of the process to which the T.I.'s are submitted. Probably too late.  Previously I had been for a long time in a complete shock.

Remember that it is not only electromagnetism. Radiation can also be used to destroy. Research the Cincinatti experiments that were conducted using minorities. And track the different nuclear accidents, past and recent.In that respect, Germany has taken a courageous step forward with the freezing of the nuclear plants projects. Research past and recent nuclear accidents and their consequences, in the country where they occurred and in other places, far from the origin of the accident. This is not a hypothesis, it is something that is really happening.

Please collect data about the perpetrators. One day will be able to trace them down and they will have to respond for the Violation of Human Rights and the false profiles that they are creating. Describe what they do to you and their devices and describe the time and the look of the perpetrators. What they are doing is a crime, bullying is not the right word to describe their actions. How is possible that a group of people create situations in which the well being and the health of a person are threatened and "nothing happens"?. Isn't it evident that at some levels there is an authorization - tacit or explicit - for their actions to be carried out. Isn't it truth that there have been numerous protests and explanations trying to find a solution to all this?

E-mail me when people leave their comments –

You need to be a member of Peacepink3 to add comments!

Join Peacepink3