Targeted Individual Update

Targeted Individual Update

TDC777

Here is the prior post and the main post.

Below is a wiki I made but never got used. Good information especially if you are new to being a Targeted Individual. Feel free to use it as you want. Copy and paste, copy and edit, or whatever you want to do. No credit necessary.

Targeted Individual Wiki

This wiki is for victims who are harassed by covert and overt surveillance. Targeted individuals will be able to learn about the basics of their situation here.

“Help, I’m new to all of this! What is happening to me?”

Do you feel like your neighbor is pointing some type of device at you while you sleep? Do cops appear to follow you wherever you go? Do acquaintances suddenly know your most private conversations?

You’re not crazy, they just want you to appear that way to others. And that is one of the main goals of this program.

First, do know that you are not alone. Others have gone through what you are experiencing right now.

Second, figure out if you are in a government program or if it is just a few neighbors who you pissed off. If it is the latter, then try to figure out what they are so upset about and what you can do to fix the problem. Fight the urge to expose it (at least for now), especially if you live in America. Most likely your neighbors feel confident in doing this to you because they have connections in government, often police officers who won’t hesitate to send you to a mental ward. Do you have a friend who is a cop who can speak on your behalf? If you feel safe doing so, can you talk to the neighbor directly and ask if there is anything bothering them? Do they hint at certain things? Do they want you to move? Being stubborn and just staying put isn’t worth it at the moment as the technology to prove these attacks hasn’t really be developed yet and producing evidence that is usable in court isn’t there yet. You have to pick your battles in life.

If you believe it is the government, then mentally prepare for a very difficult time. Unfortunately, you are up against a literal army of secret agents, contractors, real-life trolls, and ex-military and ex-police who have plenty of time on their hands and who are hunting you down with the latest technology. Only a very few have successfully gotten out of the program. But you can fight back. And, again, the first step is the same as I described above, is there something you did to piss off the government? Can you stop doing it? Have agents hinted at how to get out of the program? You have to put your ego aside and pick your battles. This will all get exposed eventually, but don’t put yourself through needless pain. Many victims wish they could get out of the program but are stuck regardless of what they do. You don’t want to be them. That bring me to my last point.

Third, if you believe you are permanently on the government shit list, the rest of the wiki is dedicated to helping you to fight back and protecting yourself.

Good luck TI!

Definitions

Since you are now part of the community, whether you want to be or not, let’s learn the language. Unfortunately, there is no official definition with these terms as it came organically through the community, so there might be some disagreements. But this should give you a general ideal of what people are stalking about:

Gangstalking - also referred to as overt harassment, is stalking done by a group in such a way that they want you, and you alone, to be aware of it to induce psychological distress.

Targeted Individual - (TI for short) is a victim of overt and/or covert harassment. This can include energy weapons, hacking, and physical stalking.

DEWs - Directed Energy Weapons, also often called targeted energy weapons. As the name implies, these are weapons of energy (often electromagnetic and sonic) that are focused on targets. The types used on Targeted Individuals are meant to be felt by only one person. They can go through walls and are invisible. As such, they are often used in covert harassment.

Psychotronic weapons - also called electronic harassment, is a broader term of the above. It includes not only invisible weapons that can do you physical harm, but also mental harm like making you hear voices in your head, influencing your dreams, and possibly reading your thoughts.

(Note: some refer to the phrase "Targeted Individuals" as only referring to the people who are experiencing electronic harassment/covert harassment.)

V2K - A technology that can transmit voices in your head with microwaves. Some people believe perps (perpetrators) are actually using some type of laser sound technology, that is currently commercially available, instead of V2K.

Covert harassment - this refers to people experiencing things without a clear person to point to as the harasser. Psychotronic weapons and hacking are often used in covert harassment as it is hard to tell where it is coming from.

Overt harassment - as the name implies want you to know who is doing it but unable to have them arrested or call them out on it without sounding crazy. A man in a military uniform keeps following you around the mall, the same police officers keep parking his car in front of your house, etc.

Microwave camera - While it sounds like science fiction, these cameras allow you to see through walls. A blob of you, not a super detailed image but good enough to know who to point the energy weapons at so no one else can feel it. They are also called through-the-wall cameras and human radar systems. They work by sending out microwaves that only reflect off of water (and obviously certain other materials like metal). Since you are 70-80% water, they can see you through walls.

FAQs

Why is this happening? Is it really the government?

We can only speculate at the time why this is happening. As their history shows, it is probably part of the government’s desire to control and silence people they see as trouble. While we are waiting for a whistleblower to expose much of this, a lot of our knowledge comes from documents leaked by accident (perhaps intentionally) through FOIA requests.

Should I run away?

Running across America is often useless as you are being tracked through a variety of ways: cell phone GPS, credit card transactions, employees within companies (e.g. searching for your name on all the flights that day), and even imaging satellites (similar to what you see on Google Maps but in real time and they can zoom all the way in).

Should I leave the country?

Many TIs have tried running away to another country like Japan, Australia, Brazil, etc. Unfortunately, it didn’t seem to help. This heavily implicates the U.S. military being involved as they have about a 1,000 military bases around the world. This also implicates The Five Eyes (USA, Canada, UK, Australia, and New Zealand) and other intelligence agencies around the world being involved. If it is the USA military as the main actor, then moving to China or Russia, might be a viable options. However, countries with a large government and military presence might have their own TI program.

I’m not a Targeted Individual and I think you guys are NUTS!

See our this next section, History and Evidence, for proof.

History and Evidence

Timeline of abuse

Moscow Signal - 1950s–1970s - Microwaving was done by Russian, but the American government stayed silent about it to see what would happen to it’s unknowing citizens. An illegal, criminal experiment.

COINTELPRO - 1950s–1970s - FBI illegal surveillance and discrediting program on groups that were deemed subversive. This included wiretaps, microphone bugs, opening people's mail before they got it, and breaking into their homes. Program included a letter to Martin Luther King Jr. telling him to kill himself because they had evidence of his sexual activities.

MKUltra - 1950s–1970s - More than just mind control. It was about training the ultimate child soldier. It involved splitting the personality of children by exposing them to extremely violent situation and even satanic practices. Almost all evidence was destroyed. MKUltra could still be going on today.

Navy Base Radio Towers - 1970s

Greenham Common Women's Peace Camp - 1980s

Jesus Mendoza - 1990s

The term “Targeted Individual” started to be searched online - 2000s

Havana syndrome - 2010s - While many suspect the Cuban and Chinese government, it could have been the CIA in an effort to keep enemies out there. This is supported in the open joke that: “The Cubans are being more open about this investigation with the F.B.I. than the C.I.A. is.”

By Agency

CIA - Long history of abusing Americans and other citizens for experiments unbeknownst to them. (CIA whistleblower Kevin Shipp claims he was gangstalked and had his family poisoned by the CIA. Sued the CIA and the lawsuit was taken to a secret court.)

NSA - While we all know what the NSA has been doing is illegal, most are sitll not aware how deep the rabbit hole goes. Per Wikipedia, “[Edward Snowden] described the NSA's PRISM program as the U.S. government using businesses to collect data for them, and that the NSA "intentionally misleads corporate partners" using, as an example, the Bullrun decryption program to create backdoor access.” Not only do they often have unfettered access to most data Fortune 500 companies already have on you through PRISM (“the number one source of raw intelligence used for NSA analytic reports”, a rubber stamp program where the NSA secretly gets complete access to your online accounts), but they steal encryption keys of other companies so they can decrypt the “secure” activities you do online using HTTPS.

DHS - Department of Homeland Security. They do surveillance on American citizens. They were found to, along with the FBI, have airplane drones (tiny Cessna planes) that do aerial imaging. These planes can also have cell phone tower mimickers to listen in on your phone calls.

FBI - while probably involved, they’re role seems to be covering up and ignoring such activities. Ted Gunderson, a former FBI agent, said several times that they were involved in the Oklahoma City bombing and 1993 World Trade Center bombing. FBI started one of the first covert and illegal surveillance, COINTELPRO, on American citizens. Wrote to Martin Luther King Jr. to kill himself because they knew of his sexual activities. (Ted Gunderson said he was gangstalked, like having his car broken into, and poisoned because he spoke out about these activities. It is believed this continuous poisoning ultimately took Gunderson's life.)

Weapons

While there are other potential weapons like plasma, x-rays, gamma rays, etc., these two categories are believed to make up the majority of psychotronic weapons:

Microwaves - most psychotronic weapons rely on microwaves to either do harm to you or to interfere with your brainwaves. Your WiFi router uses microwaves. So anywhere you get a WiFi signal you could potentially get burned from a microwave weapon or watched with a microwave camera.

Sonic - These sound weapons use inaudible frequencies (infrasound for vibration and ultrasound for burning) to do harm to you.

Shielding

While it is hard to block these attacks, something is better than nothing. The weapons that do physical damage to you often target water molecules in your body.

Water - not surprisingly water can be used to block some of these frequencies. If you are getting burned by microwaves (you’ll often developing red spots where they are burning you), simply putting wet towels in your body will absorb many of the microwaves before it reaches your body. While water might help block against sonic weapons, there’s no proof of it.

Metal - again, not surprisingly metal can help to block microwaves. The more conductive (copper, aluminium, etc.) the better. Be careful as they tend to reflect rather than absorb so you might be doubling the energy on you if you place your metal sheets poorly. They sell clothing with metal thread to block radiation (e.g. Lambs and SHIELD). If you are worried about satellite or aircraft DEW attacks, you can buy copper roofs and insulation with aluminium facings. You can also build a Faraday cage to sleep in pretty easily.

Metal can also absorb sound waves if the panel is “floating” on insulation so it can vibrate or actually floating it using magnets (this is how microphones work to absorb sound).

Dense materials - Rock, earth, lead, etc. The denser the material the most likely it will absorb or reflect energy. Be careful with lead as it is a poison tot he human body. Purchase lined sheets or line them yourself with tape. If you are concerned about satellite or aircraft attacks, you can buy lead roofing and flashings.

Hacking / Computer Security

The best strategy to use, unless you are very familiar with computer security, is to assume everything is hacked or being listened to. If you really need to communicate securely, you'll need to get a burner computer or phone (purchased in person, NOT online). While this seems like an extreme strategy, you'll quickly see why we suggest it once you learn about the technologies being used against you. One idea you should have in your head is that secret hardware is inside your computer and phone. Basically, no software you install will be able to detect what is really going on behind the scenes.

Hacking

Intel Management Engine / AMD Platform Security - Just about all computers since 2009 have these management system burned into the CPU. While designed to allowed unfettered admin access to computers on a network, it was recently realized that these CPU management engines are secret backdoors. This is basically referred to as GOD MODE UNLOCKED by hackers as it gives -3 ring access. That means they can see your system encryption keys that normally even you wouldn't have access to. This feature is often digitally signed, meaning your system won't boot unless it is enabled. You can somewhat disable it, but we can't be for sure at the moment and you might brick your computer.

NSA/CIA interception of routers, phones, and computers - Both agencies (if not more) have a long history of intercepting hardware going through the mail to install secret backdoors to monitor everything you do. While the CIA has their own hacking group and collection of zero day hacks (bugs that developers don't know about so they have "zero days" to fix it) and hacked routers, the NSA is still king with their insane amount of techniques and operations used to montior computer activity. They even intercept servers before they go overseas. So don't think that company overseas is a safe bet.

TEMPEST/Van Eck phreaking - using SDR (Software-defined radio) they can pick up the radiation your monitor gives off. With it they can see a black and white version of your monitor. This essentially jumps the air gap (a term referring to removing a computer from the Internet and its network) people use for security. The official NSA name of this is TEMPEST. Essentially, a neighbor or someone parked in a car could see everything you do. The original Van Eck phreaking was done by an electrical engineer using cheap parts from a radio shack.

Instant cell phone hacking - Many TIs report that even after purchasing new phones and using new accounts doesn't help as they are almost instantly hacked once a friend or family knows their new number. This includes having their phone and computer hot miked (the CIA is also known for hot miking digital landline phones as well) and webcams secretly being on. Edward Snowden confirmed that people being followed by the NSA will often have their family and friend's phones and computers hacked into and to further monitored their target.

All this is before you ever consider all the non-traditional hacking technologies that could be used on you: through-the-wall cameras, distance microphones (that decode your keyboard sounds into text), satellites reading your brain (no joke, the military has patents on them), and other crazy technologies.

Security

Security is a uphill battle. We can't guarantee anything, but here are some good steps to take:

  1. Use computers pre-2008 or a computer that doesn't use Intel or AMD CPUs. There is a reason why the NSA always gets computer without Intel's Management Engine. Unfortunately, contractor who make them only sell them to the government. ARM architecture chips are one option to avoid these management systems. They are used in Raspberry Pis. Unfortunately, these machines are SLOW.
  2. Use a flip phone and remove the battery. This way you KNOW it is off. If you also need a smart phone but only want one phone number, use a SIM card to switch between them. (If you use a smart phone, you can use r/LineageOS with F-Droid and Signal for more security, but they still still track your GPS and might have your friend's phone complete hacked when you call them.) Make sure all phones not being used are wrapped in several layers (6-12) of aluminium foil. (Even if it doesn't have a SIM card in it, a phone can still be GPS located.) It can be a good idea to test your phone (even your computer) with an EMF meter to make sure it isn't broadcasting your information.
  3. Don't use WiFi and don't use commercially available routers. Wired networks are harder to hack as they often need physical access. When it comes to routers, even commercial grade Cisco routers have been known to have backdoors, which were most likely intentionally there. This is supported here and here. But you can build your own router from an old computer. A DIY router can log network traffic that might not be visible to your computer (because of hidden backdoor access) and is often faster than anything you can buy from the store.
  4. Use a Linux distribution. As how to which distro and how to harden your Linux computer and your network is a wiki in and of its self. So you'll need to do a Google search, but here is a good place to start. You might want to consider enabling SELinux as that is what the NSA uses to protect their computers. You might need to change your MAC address if you are connecting to a hacked or public router (routers strip MAC addresses before sending your data to the Internet but some might log it or send it out if hacked). Do NOT use Windows. Microsoft has in the past been willing to do whatever the NSA has asked of it. With the PRISM program, I wouldn't trust Apple or Google. That brings me to my next point.
  5. Don't use any cloud services. They'll be hacked into or the companies will be forced to secretly give up the data through a PRISM court order.
  6. No commercially available security cameras. Same situation as above. Ultimately, these security cameras will be used against you. You can try a closed circuit camera system (CCTV) but TIs report them being broken, the power being cut off, and/or the film getting erased. If you really want a reliable camera system, you'll need multiple systems, both CCTV and DIY online ones, with a backup power supply. This guy was able to catch secret police in his house because he had a ton of camera systems and one just happen to turn itself back on after the cops remotely disabled them all. You can build your own online system with Raspberry Pis: Look here and here for help.
  7. No IoT. Internet of Things are devices that connect to the Internet that are not your computer, printer, or router. So your TV, cameras, light switches, light bulbs, or anything else you connect to the Internet is consider IoT. Unforunately, while they might have firmware updates for a short time, once they stop you might have permanent backdoors on your home network. Keep in mind that a Las Vegas casino's private customer information was leaked because of a Internet-connected fish tank thermometer. Again, if you feel comfortable, you can build your own IoTs that can get constant updates if you use Linux.

Stalking and covert harassment in the Media

Gangstalking on SyFy

San Diego mom thinks she's the victim of "community stalking"

Stalkers Hack to Harass Victims in Their Own Homes

Jesse Ventura talked about Targeted Individuals and psychotronic weapons back in 2012

Don’t go it alone!

You’ll need help. Remember, you are heavily out numbered. Educating yourself is good and you can buy some equipment, but being singled out will always put you at the disadvantage. There is strength in coming together.

That's it. That's the end of the wiki I made.

The only thing I should have added to it is this comic to show your friends and family to help them to understand what is going on. It's an old one, but I increased the resolution using AI. (Unfortunately, some of us, myself include, have friends and family who are perps. In my case, they either have connections to the police and military or they belong to secret societies.)

Also, I do believe the United States government has a scoring system much like the Chinese government. Only it is done in secret and not EVERYONE is scored, at least not right away. This is why the NSA is collecting as much information as they can on you to score you if you name gets submitted to the TI program. Do you have a job? Do you pay taxes? How much? Do you a have a family? Do you have kids? Do you support the government? Do you google conspiracy theories? Do you have a lot of student debt? From there they calculate your score. (All the other stuff they track, like your porn habits, are later used in your gangstalking program to humiliate you.)

And it does seem like you can get out by raising your score (e.g. get a job, pay off your debts, stop looking at porn, etc.) as I've heard of people getting out of the program by "turning a new leaf" or, in reality, becoming a productive member of this secret nation state. I'm not saying it is right to give in (as this is kind of a master-slave situation), but some people just want out of the program, which is understandable.

Report Page