This is the only known interview with Julianne McKinney, a former US army intelligence officer.

She became a member of the Association of National Security Alumni, an organization of former intelligence officers dedicated to exposing excesses by the US intelligence services.

Either of these links should be OK.

I have summed up the 10 most relevant points she makes in the interview which I pasted below.

1) Which organizations are responsible?

It´s difficult to pinpoint everything at this stage on the US government exclusively. The pattern and protocols of surveillance and harassment are virtually identical on a global scale, so someone is overseeing the entire activity. The US government is obviously complicit because otherwise these operations wouldn’t be allowed to exist. Why, it´s hard to say. Whether it´s just for testing electronic weapons systems for future use under combat conditions or whether later there´s a holocaust in the offing, it´s hard to say.

2) How is targeting accomplished?

In order to target someone, it requires that that person be put under surveillance to establish their personality traits and their capacity to interrelate with people, their capacity for corruption or non-corruption and even their religion factors into it. They are singled out for preliminary stages of harassment which would include gang stalking, entry into their private homes or apartment followed by gradually intensified and ultimately extremely intensified electronic harassment. This is the pattern that has unfolded over, and over, and over.

3) What are the criteria for selecting a target?

Quite a number of the women who are singled out appear to be too independent, perhaps too intelligent. They tend to live alone and pursue professional careers. There´s a heavy predominance of these types of women in the TI community. Men are in a smaller proportion and seem to be those who have a propensity to fly off the handle. They have a sense of self-esteem and pride that seems to invite targeting. There is a curious predominance of a certain lack of religion amongst TIs, as opposed to a certain predominance of a particular religion amongst the perpetrators.

What about numbers of targets?

4) The persons that have realized what´s going on are just a drop in the bucket. The persons that she has seen being targeted are completely unaware of what´s going on so the persons complaining of it are just the tip of the iceberg. So she would say this is very, very widespread but she can´t under the circumstances come up with any figures.

What happens with the information gathered on a target?

5) It appears that the perpetrators don’t do anything with the information gathered on a target once they get it, apart from to establish a harassment protocol which will follow that targeted individual for the rest of his or her life.

Why do they do it?

6) Part of the objective is obviously to test the latest and greatest of electronic weaponry, and other forms of technologies. A part of it is to control and choreograph those who are involved in these harassment operations on the dispensing end. And it would appear that those being targeted are simply objects, who she sees as ultimately being disposable. In other words, she thinks that once full control is established over a major percentage of the population, and enough of the population is silenced and unwilling to stick their necks out, we would inevitably be heading towards a HOLOCAUST.

7) What means to they use to lock into the target in his or her own home?

In order to target a person in their own home, they first of all need to be able to see that person. There are plenty of technologies available that allow for the imaging of a person who might be sitting in a chair for example. Using infrared imagery techniques for example, they can capture your image by monitoring the concentration of heat emanating from your body. Using certain acoustical frequencies, they can detect mass. And using sophisticated computer software, they can convert those images to likenesses on computers, which conceivably could be used in a software program that would be connected to an electronic weapon´s system. Devices draw on the existing electrical grid, and do involve microwave towers. Devices are used which are fixed to poles that are connecting to power lines. These weapon systems are used by neighbours surrounding persons who have been singled out as targets of opportunity.

8) What can targets do to protect themselves?

It´s very difficult to advise targeted individuals on how to acquire peace. All of the frequencies can somehow be blocked or deflected. The pain can be ameliorated if not halted altogether. Writing to congress or state legislators might not be a better alternative because you will be treated as something worthy of the circular basket. They just won´t intervene. Writing to the various agencies won´t help either because they will say there are no laws prohibiting these types of activities. Try to protect yourself to alleviate the pain you´re experiencing. Keep your faculties together and don´t go to psychiatrists, physiologists or doctors because many of them are involved.

9) What is the involvement of religious groups?

Perpetrators appear to belong predominantly to one particular religion, whereas targeted individuals do not belong predominantly to that particular religion. She is not prepared to name the religious group. There is a religious influence but that´s is not to say that these people aren’t being used as puppets by some broader interest.

10) Does moving help?

No, every community everywhere is wired up to the network and the protocol follows the target wherever he or she may choose to go. No TI should look for a reason as to why this is going on. It´s a serious, serious mistake. It´s a natural tendency that should be avoided. She did that herself when they started on her and over the years she came up with six different possibilities.

E-mail me when people leave their comments –

You need to be a member of Peacepink3 to add comments!

Join Peacepink3