Backup of Gangstalking Manual part 2

in zersetzung •  4 years ago 

DOD defines them as: “weapons that are explicitly designed and primarily employed so as to incapacitates personnel or material, while minimizing fatalities, permanent injury to personnel and undesired damage to property and the environment…. Non-lethal weapons employ means other than gross physical destruction to prevent the target from functioning.”
They include biological and chemical warfare, directed-energy weapons, communications warfare, information warfare (IW) and psychological operations (PsyOp).
PO – Peace Operations- the new war (4GW, IR, UW, etc.)- aka “peacekeeping operations” by the UN, are international, interagency missions to contain conflict, maintain peace, and form a legitimate government. Most are run by DPKO (Department of Peacekeeping Operations) of the UN. The US Army lists them as a type of MOOTW.
PolWar- Political Warfare- a translation of the German term, “weltanschuauugskrieg” (worldview warfare), which means the scientific application of terror and propaganda as a way of securing ideological victory over an enemy.
PsyOp- Psychological Operations, a major part of the New War and a core part of CMO (civilian military operations) that is combined with EW (electronic warfare) and CNO. PO involve syngergistic coordination of PsyOp, MILDEC, OPSEC, and EBO. PsyOp units work with the civilian population as irregular forces to attack target audience (TA) in the area of operation (AO). PsyOp operators profile TAs and TIs and devise themes to attack their TAs (target audience), which include TIs (targeted individuals). Ultimate goal of PsyOp is to modify the behavior of the TA by destroying their will using a relentless attack consisting of painful triggers. A type of audiovisual product known as PsyAct includes agents of action who carry out plays in the presence of the TA. Every single channel of communication the TA uses for information is interfered with.
PsyActs – psychological actions- aka “F2C”- are audiovisual products consisting of “agents of action” who deliver messages to a TA (target audience or individual). Agents of action follow a set of guidelines while “play acting” to deliver the messages. PsyActs usually utilize multiple people to transmit messages. Themes are presented in a performance similar to a play or movie production. (Hence, the term “surveillance role player”). Words like sets, props, performance, theatre, actors, cast, script, audience, etc. are used.
The military sometimes actually employs people from theatre actor guilds and modeling agencies. PsyActs can occur during rallies, rumor campaigns, group meetings, lectures, theatre, plays, speeches, dances, banquets, fiestas, festivals, religious activities, talks with individuals during interviews on talk radio shows, and other social activities. Messages may be subtly transmitted during these events. Agents of action follow general scripts that can be modified as needed. This type of communication includes “key words” or phrases spoken by the actors in the presence of the TA.
PO- PsyOp- Psychological Operations, – US Military states that the ultimate goal of PO is to modify the behavior of the TA (TI) by destroying their will. This is brought about by continually inflicting pain. This is accomplished by a relentless campaign used to demoralize the TI that will create perpetual feelings of intense fear and hopelessness. The DOD describes this as an “attrition-based approach:” “Attrition is the product or gradual erosion of the will. The victim of this psychological attrition gradually becomes convinced that nothing he can do will yield a satisfactory outcome to a situation.”
In PO, themes are used to transmit painful stimuli (also called triggers) through all his/her channels of communication which a TA (TI) has been sensitized to. Triggers/themes are understood at the strategic, operational, and tactical levels of the campaign and they are passed to various commanders of particular AO if the TA moves towards that portion of the battlespace.
The triggers are part of a behavior modification program called NLP (neuro-linguistic programming) which uses anchors and triggers to promote change. An anchor is created when an emotional state is linked to something such as an object, person, sound, smell, place, color, etc. Once the anchor is established, whatever the individual was exposed to during the anchoring process becomes the stimulus (trigger) that will provoke the emotion. So basically, PO is simply a series of “stimulus-response” interactions.
PO= aka or “information operations,” military deception (MILDEC), effects-based operations (EBO), neocortical warfare, political warfare (PolWar), and psychological warfare (PsyWar), aka command and control warfare (C2W), are a major part of the New War and a core part of CMO (civilian-military operations) that is combined with EW (electronic warfare) and CNO.
Po’s are a planned process of conveying messages to a target audience (TA) to promote certain attitudes, emotions, and behavior. These messages are typically conveyed using a line of persuasion known as a theme. TA (target audience) can be a group or an individual.
PO involve syngergistic coordination of PsyOp, MILDEC (military deception), OPSEC (operations security), and EBO (effects-based operations). And they are in MOOTW, CMO, IW, UW, LIC operations such as counterterrorism and peacekeeping.
The DOD and CFR consider PsyOp a NLW to be used on civilians. PsyOp units work with the civilian population as irregular forces to attack target audience (TA) in the area of operation (AO). PsyOp operators profile TAs and TIs and devise themes to attack their TAs (target audience), which include TIs (targeted individuals). Ultimate goal of PsyOp is to modify the behavior of the TA by destroying their will using a relentless attack consisting of painful triggers. A type of audiovisual product known as PsyAct includes agents of action who carry out plays in the presence of the TA. Every single channel of communication the TA uses for information is interfered with.
In “gang stalking/electronic harassment,” PsyOp is synchronized with EW (electronic warfare with directed-energy-weapons), CNO (computer network operations), and all other instruments of national power. The battlespace is your neighborhood and the war is global.
Early PsyOp research was done by a small private network of think tanks, foundations, and academic institutions, which went into partnership with government agencies and kept most of the results of their studies secret. Some of the institutions that conducted these studies were known to be subversive. Thus, much of the modern PsyOp was built by a small group of private interests, using the social sciences to install a global government. Some of these are the exact same groups promoting the use of PsyOp on civilians.
RF – Radio Frequency Weapons
Rumor Campaigns- used by PsyOp units to isolate TIs. Primary elements include the source, the rumor, and the receiver-repeater (R2).
Similarly, the US Marine Corps document, “Multiple-Service Concept for Irregular Warfare” (2006) states: “frightening the population into inactivity is sufficient to (achieve) our goals.”
TPD – Tactical PsyOp Detachment- team of about 13 personnel with a captain and staff sergeant. It is comprised of several TPT (Tactical PsyOp Teams) and provides tactical PsyOp support to brigade and battalion-sized units in support of Special Forces. TPT conducts mission assessment, determines distribution priorities, and tracks the various products that have been distributed throughout the AO. All teams maintain contact with each other. And the TPD is in constant communication with other forces such as the TPDD, POTF, or TPT during the entire operation.
TPT- Tactical PsyOp Team- small group including team leader, his assistant, and a PsyOp specialist.
CNO- Computer Network Operations- aka NW Ops, or network operations/NetOps) are information warfare attacks used to deny, deceive, degrade, and disrupt networks and computers used by the enemy. These are used in conjunction with PO (PsyOps) and EW (electronic warfare). This includes destruction of hardware and software (degrading, attacking) and spoofing (deceiving). The battlespace includes the internet. Internet applications that can convey PsyOp messages include email, websites, and chat rooms. When a TI goes online, they are entering the battlespace.
Web spoofing allows an attacker to create a copy of the worldwide web. The Air Force mentioned that an enemy’s internet could be spoofed to conceal one of its weather attacks: “Spoofing options create virtual weather in the enemy’s sensory and information systems, making it more likely for them to make decisions producing results of our choosing rather than theirs.”
DEW- Directed Energy Weapons- used to damage or destroy people, equipment, and facilities, include microwave, millimeter waves, lasers, bright lights, holographic projections, and acoustic weapons (audible, infrasound, and ultrasound). These weapons are silent and traceless. They cause a variety of effects, including tiredness, dizziness, nausea, vomiting, abdominal pain, convulsions, epileptic seizures, temporary paralysis, vibration of internal organs, cooking of organs, cataracts, burning sensation on the skin, hyperthermia (heating of body), headaches, loss of short-term memory, interruption of cognitive processes, cardiac arrest, and cancer.
These weapons can easily pass through most unshielded structures.
In their “Electronic Warfare” publication, DOD defines DEW as: “DE (directed energy) is an umbrella term covering technologies that produce a beam of concentrated EM energy or atomic or subatomic particles. A DE weapon is a system using DE primarily as a direct means to damage or destroy adversary equipment, facilities, and personnel. DE warfare is military action involving the use of DE weapons, devices, and countermeasures to either cause direct damage or destruction of adversary equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the EMS through damage, destruction, and disruption.”
DEW include microwaves, lasers, bright lights, holographic projections, and acoustics.
The two basic types of DEWs include microwaves and lasers. (Wavelengths of lasers are about 10,000 times smaller than microwaves). Both are part of the electromagnetic spectrum. The two main types of microwave weapons are millimeter wave devices such as the Active Denial System (ADS) and the electromagnetic bomb (e-bomb, which is the emission of a non-nuclear electromagnetic explosion or pulse).
DEW travel at the speed of light, are surgically accurate, can operate in all weather, are scalable, are silent and invisible (offering plausible deniability), their energy can pass through walls at distances of hundreds of meters to miles, and have long distance projection (tens of miles).
These weapons are mounted on platforms which can be a missile, aircraft, ship, vehicle, suitcase, radio, etc.
Appendix 3. European Parliament Resolution on Operation Gladio, Nov. 22, 1990:
Wikisource on Answers.Com
On November 22, 1990, the European Parliament passed a resolution on Operation Gladio. Joint resolution replacing B3-2021, 2058, 2068, 2087/90
A. having regard to the revelation by several European governments of the existence for 40 years of a clandestine parallel intelligence and armed operations organization in several member states of the community,
B. whereas for over 40 years this organization has escaped all democratic controls and has been run by the secret services of the states concerned in collaboration with NATO,
C. fearing the danger that such clandestine network may have interfered illegally in the internal political affairs of Member States or may still do so,
D. where in certain Member States military secret services (or uncontrolled branches thereof) were involved in serious cases of terrorism and crime as evidenced by various judicial inquiries.
E. whereas these organizations operated and continue to operate completely outside the law since they are not subject to any parliamentary control and frequently those holding the highest government and constitutional posts are kept in the dark as to these matters,
F. whereas the various “Gladio” organizations have at their disposal independent arsenals and military resources which give them an unknown strike potential, thereby jeopardizing the democratic structures of the countries in which they are operating or have been operating,
G. greatly concerned at the existence of decision-making and operational bodies which are not subject to any form of democratic control and are of a completely clandestine nature at a time when greater Community cooperation in the field of security is a constant subject of discussion.

  1. Condemns the clandestine creation of manipulative and operational networks and calls for full investigation into the nature, structure, aims and all other aspects of the clandestine organizations or any splinter group, their use of illegal interference in the international political affairs of the countries concerned, the problem of terrorism in Europe and the possible collusion of the secret services of Member States or third countries;
  2. Protests vigorously at the assumption by certain US military personnel at SHAPE and in NATO of the right to encourage the establishment in Europe of a clandestine intelligence and operation network;
  3. Calls on the governments of the Member States to dismantle all clandestine military and paramilitary networks;
  4. Calls on the judiciaries of countries in which the presence of such military organizations has been ascertained to elucidate fully their composition and modus operandi and to clarify any action they may have taken to destabilize the democratic structure of the Member states;
  5. Request all the Member States to take the necessary measures, if necessary by establishing parliamentary committee of inquiry, to draw up a complete list of organizations active in this field, and at the same time monitor their links with the respective state intelligence services and their links, if any, with terrorists action groups and/or other illegal practices;
  6. Calls on the Council of Ministers to provide full information on the activities of these secret intelligence and operational services;
  7. Calls on its competent committee to consider holding a hearing in order to clarify the role and impact of the “Gladio” organization and any similar bodies;
  8. Instructs its President to forward this resolution to the Commission, the Council, the Secretary-General of NATO, the governments of the Member States and the United States Government.”
  1. OTHER TACTICS (Dr. Rauni Kilde)
    There are other tactics which are not strictly part of the categories discussed so far:
    -IMPORTANT: Community-based agents (CBAs) are strictly forbidden from adding anyone to the list of targets. Target selection is done by senior Control Center (CC) staff or higher levels.
    -Punishment of people who side with and help the target. Friends, family members, and citizens who do not place a high value on community sometimes help targets. In these very specific cases, CC-authorized punishment in the form of individual acts against them is appropriate. The system can arrange for these target sympathizers to be found guilty of crimes, or liable for civil actions, for example. This is important for maintenance of the system.
    -Target bank accounts can be disrupted in ways which do not give the target cause to involve law enforcement. Examples: target protetion can be changed to “youth account,” or, an overdraft protection feature can be disabled, or simply steal money from the account. It is called action of “international banking ring” and usually at first the sums are around 50 – 100 dollars which are ataken when the target pays small bills.
    -Money is never transferred to the journal subscription or membership in a certain club like “opposition to government surveillance.” Money simply “disappears” from the bank with help of cooperating employers. I have experienced the myself several times. Bank accounts are “hacked” for the payment and a new bill arrives for the already paid bill by the target, and the receipt of payment is stolen. There is cooperation with military intelligence, Stay behind, NATO, and foreign intelligence agencies also against their own population. (This is the) so-called secret silent war going on in all secrecy.
    Appendix 4: From Total Individual Control Technology by Omnisense
    Organized Stalking/Electronic Harassment. The New Hi-Tech Generation of COINTELPRO
    In a Nutshell: Government sources are using directed energy weapons and artificial intelligence to terrorize, threaten, intimidate, discredit, silence, torture, and murder dissidents. In addition, security contractors (among others) are being hired as military thugs to gangstalk targets[19].
    Zerzetsen: “Inflicting as much pain and suffering as possible without leaving any marks.[20]” Directed energy weapon programs revolutionized this…
    Counter-proliferation programs are intended to subvert the potentials of a target while punishing them with psycho-sadist techniques. The perversions of cointelpro are notable. The murderous and sadistic ethos of government counter-proliferation programs echos that of the Nazis and this perpetrator network of war criminals are committing sickening acts upon the global population.
    Modern Day COINTELPRO Objectives:
    These are counter-proliferation centered programs intended to subvert all progress
    To discredit the target / To character assassinate / To slander the target
    To taint the target’s image / To misrepresent the target
    To suppress the target’s monetary success
    To suppress the target’s good character qualities or people’s awareness of positive aspects of the target
    To arrange a partner for the target or mind control the partner of the target
    To destroy relationships of the target
    To co-opt the target’s manifestation
    To turn the target into controlled opposition (In terms of beliefs & actions)
    To incriminate the target
    To round down the target’s output and audience – To marginalize the target
    To eliminate connections & networking ability
    To suppress the target’s personality
    Sanitization of pleasure, emotions, and individuality
    To punish the target / To torture the target
    To destroy the target’s life
    To stop a target from procreating / Ending a target’s bloodline (Eugenics)
    To suicide the target / To covertly assassinate the target
    To cover up the targeting operation
    “If they see too much power and originality coming out of someone, they either use it and siphon it or they undermine it in order to neutralize it.” ~Ahmad Enani (TI)
    COINTELPRO 2.0 Methodology:
    Covert remote influencing technology suite
    COINTELPRO 2.0: Thought surveillance neural AI net for psyche profiling
    COINTELPRO 2.0: Directed energy weapon mind control network for counter-proliferation targeting
    Ai based retro-causation; Extensive international neural monitoring programs can calculate a target’s potentials before the target is aware of them
    Gangstalking / Organized Stalking
    Trauma based mind control – No touch torture
    Character assassination / Slander via proxies
    Technological illusions (PSYOPS) / misdirection
    Electromagnetic mind control aimed at discrediting the target
    Mind control of people who provide opportunities for the target
    Use of family against the target (e.g. Mind control of family)
    Use of pharmaceutical drugs against a target
    To orchestrate the detaining of the target in a psyche ward
    v2k to get a target diagnosed as a “paranoid schizophrenic”
    Exaggerated, warped and untrue slander about the target is proliferated
    Technology playing devil’s advocate via implanted thoughts to get a target in trouble
    Agenda to incriminate the target (Advice for COINTELPRO targets: Stay lawful)
    Use of ego against a target
    Weaponized mind control against a target
    Coercing of a target into appearing overly paranoid (e.g. An objective of stalking)
    Specific technological control of a target’s body language or vocal tone (e.g. To generate mistrust)
    Total individual control technology is used as a tactic to take away a citizen’s rights through faulty mental illness diagnoses[21]
    Outlandish black project technology experiences intended to discredit when spoken
    Use of electronic control grid to mind control misfortunes for a target
    Synthetic social phobias ~ Synthetic social anxiety (e.g. Public speaker related suppression)
    Suppression of whatever platform the target is talented in (e.g. Music production, software design)
    To dehumanize a target via electromagnetic neuroscience
    Severe targets are sanitized of pleasure, emotions, and personality
    Synthetic suicide programming
    Technologically enabled serial killers with a taste for revolutionaries & activists
    Electronic Targeting Holocaust
    “While all these traditional tactics have proven fruitful throughout time without waning effectiveness, the agencies involved in extreme cover-ups prefer another tactic that seems to have withstood the test of time too. That is labeling someone “paranoid schizophrenic” or mentally ill. Once that label has been attached to someone, almost all testimony will be disbelieved. The military has employed this tactic since the 60’s to get rebellious soldiers and others locked up in mental hospitals. But since the weapons testing of neurological disruptor technology has begun on the general population beginning in the early 60’s and then stepped up to full throttle in 1976, the scope of what is considered mentally ill had to be reprogrammed into a broader definition for the general population.” ~Department of Defense Whistleblower: From the Out of Print Book – The Matrix Deciphered
    “My name is Dr. John Hall, I’m a medical Doctor from Texas. As a physician, relative to some of what you’re hearing today, in the community we are seeing an alarming rate of complaints of use of electromagnetic weapons, microwave auditory effect, silent sound spectrum, EEG cloning,… Which has taken the lab out of the laboratory and into the home, most of these from the research that we’ve reviewed can be done remotely. It seems to be more weapons research than medical research. I’ve personally corresponded with upwards of 1,500 victims all complaining of identical complaints from every state in the nation. Of being exposed to electromagnetic radiation. Non-ionizing radiation. For the use of cognitive control or behavior control….” ~Anesthesiologist Dr. John Hall Speaking to the Presidential Bioethics Commission
    “I am also targeted and this is my story. My name is Sandra Fields. I’m an architect, recipient of Who’s Who of Women in America achievement award and have run a successful business for over 28 years. My life and livelihood have been compromised for the last 11 years by being attacked by electromagnetic radiation torture, and by organized stalking… Thousands of Americans are currently suffering from chemical, electromagnetic, psychological and physical torture with no government relief or laws. Our servicemen, prisoners, and thousands of unknowing innocent civilians are currently being lamed, tormented and tortured as a result of military research, medical research, pharmaceutical research, physiological and psychological studies that have virtually destroyed participants’ sanity, physical well-being, reputation and privacy.” ~Targeted Individual Sandra Fields, Speaking to Obama’s Presidential Bioethics Committee
    “What the governments found, was that you could induce by changing the pulse frequency like morse code of the microwaves going into the brain and interfering with the brain, by specializing on the pulse frequency you could induce psychiatric illnesses to the point where a psychiatrist could not tell if it is a genuine psychiatric illness or an induced psychiatric illness. So what you can do theoretically, is you can target an individual’s brain, they may have auditory hallucinations where they hear things, which is actually quite common with microwaves. Or show signs of schizophrenia, for instance 6.6 pulses a second can induce severe sexual aggression in men. … Technically what you could do is have someone committed to a psychiatric hospital or a jail for a crime, just by somebody saying that they had a psychiatric problem where by they didn’t.” ~Ex-British Royal Navy Scientist Dr. Barrie Trower
    “They can cause insanity, and it was an experiment. One of the experiments was to take an ordinary sane person, cause insanity, and have a psychiatrist who was unknown to everybody diagnose schizophrenia, or paranoia or a psychiatric illness. That was a successful outcome. And the person would spend the rest of their life in an asylum in misery, but to the government scientists that was a success.” ~Ex-Black Project Scientist Dr. Barrie Trower
    “The war against satellite terrorism isn’t just the USA. This is a global issue! I’m in tropical Queensland Australia and get battered daily.” ~Targeted Individual Amanda Emily Reed
    MKULTRA Cover Stories
    This technology has interacted with quite a large amount of people, however it is almost always misidentified as other sources[8].
    Directed Energy Weapon Cover Stories:
    Mental illness as an electronic harassment cover story
    End game technology packaged under persuasive “spiritual warfare” illusions
    Directed energy interaction packaged as the supernatural
    Government technology under a cosmic being facade
    Religious themed illusions / Using religion mythology as a means for cover stories
    Extraterrestrial contact as a psychological operation cover story
    Ghosts as a cover story – AI orchestrated phantom illusions
    End game technology as a sorcery cover story
    End game technology as the real source behind effective voodoo
    Witchcraft as a directed energy cover story
    Black project science under a black magic cover story
    Directed energy attacks deceptively packaged as physiological ailments
    Synthetic signals in the brain from implants framed as physiological ailments
    “Psychic Attack” as a directed energy attack cover story
    “Spiritual Attack” as a directed energy attack cover story
    New Age cover stories (e.g. Disembodied spirit illusions)
    Old age mythological gods used as a cover story
    Human based electronic harassment with aliens packaged as the perpetrator
    Scientology methods as a cover story for technological remote influence
    Exotic neurobody illusions (e.g. Chakra, entity attachments, ethereal implants)
    Inter dimensional being interaction as an electronic targeting cover story
    Exploitation of illusory explanations to conceal directed energy crimes
    “People who have already assimilated the cover stories are often not ready to hear the truth.” ~Omnisense
    Beings Impersonated:
    Neighbors (Targeted Individual v2k)
    Black Ops Agents (Targeted Individual v2k)
    Family (Targeted Individual v2k)
    Deceased Loved Ones / Deceased Relatives / Deceased Pets (Psy Ops v2k)
    Demons (Mind Control Cover Story)
    Jinn (Cover Stories)
    Archons (Cover Stories)
    Inter Dimensional Beings (New Age Psy Ops)
    Extraterrestrials (Cosmic Being Impersonation Programs / UFOlogy Bastardization)
    Entity Attachments (New Age Psy Ops)
    Shadow Beings (e.g. To Cause Fear from an Obscure Source)
    Archangels (To Impersonate a Higher Authority)
    Lucifer (To Persuade into Evil)
    Satan (Satanist v2k)
    RA (New Age Psy Ops)
    Spirits (Spiritual Warfare Illusions)
    Ghosts – Phantoms (Directed Energy Trickery)
    Faeries (Rehashed Old Age Cover Stories)
    Higher Self (Mind Control Cover Story)
    Panpsychism Based Impersonations (e.g. Gaia aka Mother Earth Speaking to People)
    Saints & Mother Mary (Religious Impersonations)
    Holy Spirit (Psychological Direction Method / Sleeper Assassin Method)
    Ascended Masters (Impersonation of a Higher Power)
    Jesus (Any Vector of Vulnerability is Exploited)
    Person’s of Note (e.g. To get a Target to Murder them, To Psychologically Direct)
    Any Mythological God of the Past (These can be pretty cool)
    God / Allah / Yahweh / Jehovah (Impersonation of the Highest Power)
    Done via Electronic Telepathy Contact (Voice to Skull – v2k)
    “Directed energy weapons operate invisibly while the inducible mental limits of directed energy weapons are the limits of consciousness itself, this makes for an incredibly potent environment for illusions of all types.” ~Omnisense
    NeuroWeaponry & Artificial Intelligence Quotes
    “The point of the program is to have maximum psychological effect and leave the minimal amount of evidence.[22]” ~Anonymous Targeting Program Insider
    “In 1985 CNN did a special report on radio frequency weapons. They hired an engineer who built an “RF Mind Interference” machine based on Soviet schematics. The machine successfully transmitted images into a CNN reporter’s mind. The stunned engineer said that, given three weeks time, he could scale up the machine to use on a whole town, causing them to do things against their better judgement, see and hear things that weren’t there, etc. The pentagon said it was too sensitive a subject to comment on. Remember, these effects were achieved by civilians over 30 years ago! One can speculate that they’ve made great advances in the past decades.[8]” ~Targeted Individual Jim Hastings

Dr. Kilde’s Chapter 18 text is followed by these appendices:

Appendix 1: Key words and phrases, taken directly from this manual.
Appendix 2. Key terms from Rich’s “New World War: Revolutionary Methods For Political Control” (2011). (ETK comment: Note that the terms, definitions, military documents, laws, and patents provided by Rich prove the existence of the operations described in Kilde’s “manual.”
Appendix 3: European Parliament Resolution On Operation Gladio
Appendix 4: From Total Individual Control Technology by Omnisense

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!