Targeted Individual Update

Targeted Individual Update

TDC777

Here is the prior post and the main post.

Thought I would give a final post on what to do if you are a gangstalking victim/Targeted Individual.

How To Fight This: The Main Point

This guy gives some decent advice.

(I would also suggest Lambs clothing for shielding purposes.)

If you're too lazy to read the above, it is to get yourself off the list by either stop doing what put you on the list in the first place or make it into a legal battle. But, I guarantee you, you won't win that legal battle alone.

While this lady keeps trying to fight it in court, I think she is making a big mistake doing it all alone. She claimed in that video that all the energy weapon attacks kept her from writing/filing papers in time causing her major and most important court case to get postponed. She should have hired a law firm to do all of this for her. Law firms represent murders and rapists, so they won't think twice about helping a Targeted Individual no matter how crazy they sound as long as you have the money. And if she doesn't have the money, then she should do a GoFundMe page, especially if she thinks it'll help other TIs. 

The main point is: the only people I've seen successfully fight back, both for gangstalking and DEW attacks, were those who got help from someone else.

Kathleen Watterson was able to win a court case against her perp (who was shaking in the courtroom) because she got help from Levi McCann, who I think is an electrical engineer specializing in signals and is a conspiracy theorist himself.

Another case I saw on Reddit (I'm having a hard time finding the link) is a guy who I think ran a conspiracy podcast. When his gangstalking started, he went straight to the police and his friends (I get the feeling some of his friends were in the police department). After having him do a psych eval to make sure he wasn't crazy, they setup a team to see who was harassing him. They were pretty serious about it as they even had a nickname for their team (which I don't remember). It got to the point where the people involved came forward and admitted to everything, BUT they had the victim sign a non-disclosure agreement. If he had to sign a non-disclosure agreement, it must have involved some government agency, probably federal. 

Again, he was only able to pull this off because he had a TEAM helping him out. Going this alone is a LOSING battle. 

You don't necessary need money to fight this (it obviously helps), but you do need people.

Shielding

Read my other post here

Basically, lead and highly conductive metal (copper and aluminium) are your friends. Water an attenuate it some, but you are better using it as a last ditch effort (e.g. wetting your clothes to protect you from the microwaves). If you have nothing to protect yourself with, then use some aluminium foil. Yes, you are now one of the tin foil hat people.

Not too sure about what to do about sound weapons. They're used on me often but they don't bug me too much. Most sound insulation materials barely attenuate it unless you have several feet worth of it between you and the attacker. You can try rubber and vinyl if you want.

Computer/Tech Safety

Take a look at this post here.

I didn't want to write a long post about it so I linked to the above, but I have some points to make.

In addition to the above:

1.) Don't use any computers or routers that are shipped to you (the NSA and CIA are notorious for intercepting routers and computer and installing malicious software and hardware). You can make your own router from an old computer if you want. Faster and more secure.

2.) For your main computer, try to get an old (pre-2009) computer without Intel ME or buy one disabled (but those companies usually ship them so that goes against the first rule so you'll probably have to disable it yourself, which could brick your computer). You could use a Raspberry Pi if you want (and keep it with you), but it'll be a slow computer.

3.) I would also suggest an out-of-band network tap (remember, don't use WiFi) to track all your network data. If you get that throwing ninja star one and a Raspberry Pi, those aren't too expensive or hard to setup. (Those should be okay to get in the mail as that have only a small amount of circuits and they are are exposed to you, so it would be hard to tamper with without it being noticed. Besides there is an army of hobbyists and hackers who would be happy to look at it if you have any issues.) To monitor, I would use Tcpdump or Wireshark on your Raspberry Pi. I would also use them on the computer you're monitoring to see if you have any differences. Out-of-band network taps that people pay attention to is what the NSA fears the most. This tells me they are probably using a lot of secret hardware backdoors, like Intel ME, to do their hacking as such activity wouldn't show up on normal network monitoring software on your main (in-band) computer.

4.) Assume all smartphones are and will be hacked. (I've gone through a ton for them all to get hacked sooner or later.) Computer are pretty easy to open up and investigate; cellphones, however, are basically these black boxes. Also assume all cell phones are being GPS tracked (often police only need your phone number to do this). The simplest way to make sure it is off is to remove the battery. If you can't remove the battery, then wrap it in SEVERAL layers (6-12) of aluminium foil. Microwave ovens do NOT work. Just roll your phone in the aluminium foil like a Fruit Roll Up and fold over the edges. Keep in mind, it can still record audio like this and can upload it later when it is outside the Faraday cage. 

5.) Also, assume your family and friends's phones are also hacked. Edward Snowden confirmed that this was standard protocol when monitoring US citizens. Furthermore, assume some type of distant microphone is being used on your house or apartment. Thus, nothing you say in it is private. 

6.) Finally, all the Internet data going over the communicate wires is being stored by the NSA in Utah. While it might be encrypted, it is probably only a matter of time before they get the key (why decrypt when you can just steal the private encryption keys from people?). Thus, everything you do online will eventually be made public.

Again, Don't Do This Alone

If you get someone knowledgeable, they can handle the tech and shielding part. They can also help with the legal aspect. Heck, they might even know someone in the government who can get you out of the program. 

They target those on the fringes of society for a reason. They're typical bullies. And the best defense for a bully is a friend who'll stand up for you.

Good luck TI.

Report Page