I have been a victim and have been researching this program for a while, and this may help explain parts of the gang-stalking that occurs with this program. The best description comes from notes surrounding a 1992 lawsuit filed by a former NSA employee (Akwei) that was supposedly thrown out of court, and I have included / updated the number of employees in the intelligence areas of the Federal Govt based on various 2013 figures (these agencies are the ones with the most probable ability to either access or participate in various parts of this program).
Note that the intelligence communities have a lot of official employees, as well as off the books informants, front operations, and former/retired individuals who may form black-ops operations and operate as outside contractors. These numbers are relatively current as of 2013, based on various gov’t websites and news-stories about the number of furloughed employees vs the total number of gov’t employees (so these numbers most likely do not include the off-the-books informants/front operations and outside contractors).
- CIA/NSA – approximately 27,000 employees
- Dept of Justice – approximately 114,486 employees (includes the FBI with 36,000 employees, the Drug Enforcement Agency, and the US Marshalls)
- Homeland Security – approximately 231,117 employees
Many of the intelligence agents are highly trained in many areas, including surveillance using high tech equipment and tag-team stalking, breaking and entering and covering up their tracks (see the book “Secrets of the FBI” for details), some have technical skills in construction/plumbing/electrical areas, along with psychological training to facilitate manipulation of the victim and their environment, and the ability to subtly manipulate society (both in a personal way and in a job-related way) to target an individual. They infiltrate every profession in society (including plumbers, electricians, construction contractors, locksmiths, security camera installers, audio equipment installers, pawn shops, trash collectors, lawyers, doctors, CPAs, bankers, bus drivers, etc.) to monitor society, but their influence can go beyond monitoring and become targeting.
The CIA Book of Dirty Tricks is also used to target individuals, so many will experience car sabotage, adultery sabotage, friendship sabotage, financial scams and health scams, job sabotage, fake FB friends, computer Trojan viruses, computer sabotage and IP manipulation/diversion to targeted websites/ news-stories, and other methods to frustrate and eventually bankrupt victims.
Is the Neighborhood Watch an outgrowth of this program? And how much equipment and funding does the Neighborhood Watch program receive from the Federal Gov’t?
An overview of gang-stalking and v2k, based on info from a 1992 lawsuit that Akwei filed against the NSA.
Covert Operations of the U.S. National Security Agency
http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm
Domestic Intelligence (DOMINT) (equates to gang-stalking, sabotage and character assassination of victims)
The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place.
This surveillance network is completely disguised and hidden from the public.
Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA's electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs.
NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.
Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.
NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA's domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.
6. NSA TECHNIQUES AND RESOURCES
Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country.
A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.
Remote RNM Devices (also know as voice-to-skull, remote neural monitoring)
NSA's RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous systems to affect their performance. RNM can electronically identify individuals and track them anywhere in the US.
This equipment is on a network and is used for domestic intelligence operations, government security and military base security, and in case of bioelectric warfare.
Spotters and Walk-Bys in Metropolitan Areas (also known as gang-stalking)
Tens of thousands of persons in each area working as spotters and neighbourhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.
Agents working out of offices can be in constant communication with spotters who are keeping track of the NSA's thousands of subjects in public. NSA agents in remote offices can instantly identify (using~ RNM) any individual spotted in public who is in contact with surveillance subject.
Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing lines. (some v2k victims get barbiturates / truth serum or sleeping gas inserted into the air vents and water supplies)
The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding drugs).
This is an outgrowth of CIA pharmapsychology (psychopharmacology).
Brief Overview of Proprietary US Intelligence/Anti-Terrorist Equipment Mentioned
Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.
EMF equipment that gathers information from PC circuit boards by deciphering RF emissions, thereby gaining wireless modem-style entry into any personal computer in the country. All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).
Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980s.
Comments