THE POWERS THAT BE DO NOT WANT THIS INFORMATION OUT THERE. THEY HAVE BEEN TRYING TO BLOCK IT FROM SEARCH ENGINES AND WILL NOT ALLOW ME TO SHARE IT.
PLEASE SHARE WIDELY!!!
* * * * *
By
Anthony Forwood
UPDATED
– April 15, 2013
NOTE:
This is a SPECULATIVE look at the possible structure and organization
of the secret network that I believe lies behind organized
gang-stalking and mind control. What I describe here is based on my
own research, observations, and personal experiences. How I depict
the gang-stalking network within this document may not precisely
reflect the way it’s actually structured or how it operates, but it
seems to be pretty close to how things really are. Whatever the case,
the structure and operational methods described here are completely
workable in all respects and the security measures used would be
quite effective in keeping the network and its activities under a
very tight blanket of secrecy. This document complements Social
Self-Destruction: A Secret War of Controlled Chaos,
which can be found at the link provided at the end of this document.
It is highly recommended that you read that article first.
The
following information can still be greatly extended and improved on,
and probably will be at some point, so please check for the latest
version, always available at:
August
18, 2012
"The
great strength of our Order lies in its concealment, let it never
appear, in any place in its own name, but always covered by another
name, and another occupation.” -
Adam Weishaupt, founder of The Grand Lodge of the Illuminati
Creation of the Network and its Membership
What
I describe here I will call ‘The Network’, but this is only for
the purpose of giving a name to something that doesn’t necessarily
have one nor otherwise have a requirement for one, at least for the
public at large, because there is very little chance that it will
ever be talked about by anyone who can be certain of its
existence.[1]
The
Network is made up of many isolated individuals and groups throughout
the US, Canada, and in many other countries around the world. The
term ‘group’ can be defined here as any group of people at all
who hold a common bond of unity, and might be of any type or size,
from small social groups of just a few people to entire workforces of
large corporations, memberships of international organizations, and
governments. But it even goes beyond just this, since it appears that
just about any method that might be used to draw people in will
likely be applied.
Most
large corporate workforces and many smaller ones have already been
brought wholesale into this Network through ‘Occupational Health
and Safety’ laws that require employees and employers to report
anything in the workplace that might be considered suspicious or
threatening activity. Anyone who is reported on is assessed (without
their knowledge) to determine if they should be put on a ‘watch
list’. Watch lists are a key aspect of the Network’s operations,
and will be discussed further on.
Similar
‘Community Health and Safety’ laws have also been established in
many countries so that these reporting systems also extend into
school environments, church congregations, social groups,
neighborhoods and public streets, and even private homes.[2]
A
special reporting system has also been set up to accommodate these
laws and manage everything, and various types of recruitment programs
are routinely conducted within workplaces, community groups, and
elsewhere, to enlist ‘citizen agents’ and to promote the security
advantages that Network members receive. This includes receiving
instant notifications by phone whenever a dangerous person is in
their area.[1] This notification service is only available to members
who have signed a secrecy oath or non-disclosure agreement. This is
explained more fully in a later section.
The
Network connects all of its members to a central command system that
is very sophisticated and highly automated, and is able to handle
virtually all of the work involved in normal Network operations. This
includes managing members, handling communications, information
gathering, planning operations, performing logistics, directing
operations, tracking both members and targets, profiling, etc. Very
few human resources are needed to manage this system, and direct
contact between management levels and operational levels is very
minimal. Except during recruitment, all contact is conducted through
a highly secure Network communications system.
Soon
after these health and safety laws were enacted and the reporting
system was set up, a significant number of people were quickly
recruited into this Network and have since been under strict secrecy
oaths. People are being recruited all the time, and the Network is
constantly growing. As new members, they are joining a secret force
of eyes and ears in the workplace and community, assigned to report
on any suspicious or threatening activity through this system, and to
monitor someone who has been put on a watch list. These targeted
individuals are constantly tracked, and members receive cell phone
text notifications whenever they are in their area, and they are
expected to assist in monitoring and ‘policing’ these people
under the pretext of maintaining the safety of the community. If a
member is a good candidate for deeper involvement, various different
opportunities to take part in ‘special operations’ can be
offered. These opportunities are only made available to members who
match a certain profile and have been cleared for these activities.
Certain
individuals and groups that lie outside mainstream society – street
gangs, biker clubs, prostitutes, criminals, drug addicts, homeless
people, alternative groups, illegal immigrants – are also brought
into the Network through other means than those described above. Any
person or group is a candidate for being recruited into this Network,
and there are various different classifications of membership for
different types of candidates, which is determined through careful
profile matching.
The
many individuals and groups that make up the Network’s vast and
varied membership are kept as isolated as possible from other members
and completely unaware of the full extent of the Network, and they
don’t know about or even expect that many of the other individuals
and groups are involved, and identities between members are kept as
anonymous as possible. However, some groups of members will
necessarily be aware of each other’s involvement to some capacity,
but these groups remain otherwise just as anonymous and isolated
within the Network.
As
well as them not being aware of the full extent of the Network and
who other members might be, none of the members ever know anything
more about what they are involved in beyond what they are informed of
through the Network. All information circulated through the Network
is carefully controlled, and cover stories can be given for the
activities that members engage in, as well as the pretexts for doing
so. Covert monitoring of every member’s communications assures
early warning of possible security breaches.
Besides
the normal operations involving monitoring and policing targeted
individuals, certain individuals and groups are also put to use in
various ‘special projects’ that have to do with deeper levels of
the Network, and usually involve the exploitation of targeted
individuals in some way.
Many
groups and many individuals have been absorbed into the Network one
after the other for many years, until now virtually any given group
that exists could have a significant number of Network members within
it, acting through that group or as part of another. Since its
inception (as early as the 1980s), this secret Network has expanded
beyond corporate workforces, community groups, and various other
organizations that were brought into it early on. It has come to
include street gangs, biker clubs, immigrants, homeless people,
tourists, and even children. There is no person or group that the
Network doesn’t have a use for.
The
Network is open-ended, so that it’s capable of unlimited expansion
and can encompass any number of individuals and groups into itself
for any number of purposes. It is intended that eventually every
person on the planet will be included within its database, either as
a member or as a targeted individual, and will be under constant
watch and direction.
The
Network is ideally suited for incorporating a variety of new
functionalities into its structure, not the least of which are
mind-control technologies (discussed further on). The central
computer system runs specially designed artificial intelligence
software that gives it the ability to learn and evolve new
functionalities that can be incorporated into normal operations or
special projects.
The
Network is connected into every communication system, information
network, and database on the planet, and incorporates these into its
data collection procedures. It also takes full advantage of ECHELON,
the NSA’s global surveillance system. Virtually any information
that exists in digital form can be accessed by the Network system for
real-time surveillance and intelligence gathering purposes. The
monitoring of communications also includes the ability to interfere.
This means that information flow can be controlled by various covert
‘denial of access’ techniques, and on a person-by-person basis.
Full-time
GPS links to members and targets through their cell phones are used
by the Network system for tracking and logistics purposes. Covert use
of RFID chips make it possible to track anyone who doesn’t own or
carry a cell phone.
With
these and other connected resources, the Network’s command center
can constantly gather, analyze, and update an extensive amount of
information on any person, as well as instantly locate and track them
in real-time. The Network incorporates advanced profiling systems
into many of its automated processes, such as for selecting,
evaluating, and managing members when recruiting, planning
operations, assigning operational tasks, etc.
As
a policing system, the Network maintains a separate database for
individuals who have been flagged as targets for monitoring and
policing, which will be carried out by Network members through
various assigned operational tasks. Targets are determined through
the reporting system described earlier, which involves receiving
threat or suspicion reports from members, assessing these reports and
the individuals involved, and determining whether they should be
placed on a watch list. To do this, extensive information is gathered
on a reported individual and analyzed, and if they match certain
qualifications then specific operational procedures are determined
for handling them. Once an individual is placed on a list, the target
is constantly tracked by the Network system and monitoring tasks will
immediately be assigned to members within the target’s neighborhood
or workplace, or wherever else they might go. Manual monitoring by
members will include regular reporting to the Network command center.
System Compartmentalization
Because
the Network is officially non-existent and must always appear that
way in order to maintain its security and achieve its ultimate ends,
it is important to those who manage it that knowledge of it is
minimized as much as possible by keeping meticulous records of what
information each member is privy to or might be aware of, as well as
what cover stories they have been given regarding their involvement
in any operations. This minimization of awareness means that members
should be kept from knowing how extensive the Network and its
capabilities are, the details of membership activities, and the
identity of other members. The Network is therefore kept highly
compartmentalized into isolated individuals and groups that work
anonymously to each other but are coordinated through the Network’s
command center so that their individual activities can be perfectly
integrated into precisely timed and tightly controlled operations,
such as in street theatre activities.
This
strict compartmentalization of members to restrict their knowledge
about the Network and other members not only assures the security of
the system and its operations, but also assures that upper management
levels can avoid direct responsibility, should anything go wrong.
Network compartmentalization also allows members to unknowingly
become targets, as well as for members and member groups to be
unknowingly pitted against each other to achieve certain desired
results, without them ever realizing that they’re being
manipulated. Compartmentalization assures that a member who might
become a target at some point doesn’t jeopardize other members or
lead to revealing any sensitive information about the Network or its
operations that they might be privy to. Therefore, the identity of
members and groups and all details regarding their participation in
operations is kept as confidential as possible and cover stories are
implemented as pretexts for assigned tasks whenever possible to
facilitate these ends. It’s equally desirable to keep members as
anonymous to each other as possible, and although this isn’t always
possible, such as when dealing with groups where the members already
know each other’s identities as members, the identity of members
will otherwise be secured from other members and member groups as
much as possible.
Network Operations
Members
who are recruited into the Network are initially used within
operational assignments by being given certain specific tasks to
complete. Operational assignments are carried out by any number of
members who are usually unaware of the identity of the other members
involved in the same operation, unless they’re operating from
within the same member group. When an operational directive is
entered into the central command computer by management, the computer
system collects all the relevant data it needs and does an analysis
of the situation, works out a plan of action, breaks it down into
individual tasks, organizes members, and coordinates the execution of
the operation. All communications during the execution of an
operation will be conducted strictly through the use of cell phone
text messages, and will pass through the secured Network system.
There
are both ‘official’ and ‘unofficial’ operations. An
‘official’ operation will strictly involve acting as a ‘citizen
agent’ to monitor a workplace or community for suspicious or
threatening activity, or to police targeted individuals who have been
placed on a watch list. All members are expected to take part in
these sorts of operations.
An
‘unofficial’ operation goes beyond these activities, and includes
any activities that members might engage in of their own free will
that are approved activities, or which they have otherwise been given
clearance for. Members aren’t usually directly informed about these
approved activities, but are left to learn about them on their own,
or covertly influenced to engage in them, if and when they reach the
deeper levels of the Network. This is to remove any direct
responsibility from upper level management while allowing them to
take place in a controlled manner. Certain ‘unofficial’
operations will include activities that are covertly influenced
through the manipulation of a member or group in order to cause them
to believe that they are acting of their own free will in carrying
out tasks that result in fulfilling a certain operational directive.
These types of ‘unofficial’ operations always involve the testing
or application of mind-control technologies.
Recruitment Procedures
New
members are continually being recruited into this Network so that it
has continually been expanding as it has drawn in more and more of
the general population over the years and recruited them into
membership. These new recruits are carefully screened for selection
using profiling systems to determine various qualifications, such as
for classification into different membership levels, and for
assigning operational tasks.
Upon
approval for membership, each recruit is made to sign a lifetime
secrecy oath or non-disclosure agreement in order to legally bind
them to a lifetime contract of cooperation and commitment. Once
signed, they will be forbidden to ever talk about the Network or
their involvement, and must pretend complete ignorance of its
existence to others. All members will thereafter be unknowingly under
constant electronic surveillance to track and monitor them for
security reasons, as well as to accumulate data that can be used for
determining management procedures for them and usability in
operations. This information will also be used to control a member in
the case that they become a security risk or step out of line.
Penalties
that include lengthy jail terms for breaches of secrecy oaths or
violation of non-disclosure agreements are only the first deterrent
against exposure of the Network. Further deterrents are also
available, many of them involving blackmail, as well as mind-control
technologies that are incorporated into the system. However, the
greatest deterrent for any member will be the threat of being
rejected from the system once they have been accepted into it and
come to understand what might happen to them if they are.
Although
most knowledge about the Network and its operations and activities
can be easily controlled and contained in the event of any unforeseen
situation, it is still sometimes necessary that a balance be
maintained between what a particular member might know about the
Network and how much control can be maintained over that member, and
this can leave the Network vulnerable if care isn’t taken so that
maximum control is always maintained. The more controllable a member
is, the easier it will be to assure that problems don’t arise that
might jeopardize the Network, and the more likely they can be brought
into its deeper levels. Tight control of members also allows for
greater flexibility in Network operations and activities, allowing it
to expand as new application possibilities arise. Therefore, a
variety of control mechanisms can be incorporated into the system,
ranging from very crude to highly sophisticated.
One
method of gaining the membership of a candidate into the Network is
to give exaggerated praise for whatever traits or skills that
candidate has that they might pride themselves in, and to lead them
into believing that those traits or skills are highly sought and will
allow the candidate to receive special advantages and have doors
opened for them through their dedicated service to the Network. This
might be any sort of trait or skill at all, as long as it can be made
use of within Network operations or activities. This includes both
legitimate as well as criminal traits and skills. The police, acting
as a major member group within the Network, take advantage of those
criminal elements that they come into contact with during their
official duties, and routinely recruit them by first building the
recruit’s confidence in their criminal abilities, and leading them
into believing that they would benefit by helping the police with the
use of these skills. Criminals are highly sought for certain illegal
tasks that the police want performed which they and other members
will not dare to engage in themselves.
Blackmail Insurance
Although
a crude form of control, blackmail is still highly effective and
completely within the repertoire of methods used to recruit, control,
and silence members. As such, blackmail situations are put to good
use and are standard practice within certain groups that are part of
the Network. Normally, it will be used where secrecy oaths or
non-disclosure agreements aren’t as practical or effective, such as
will be the case with criminal groups who aren’t necessarily
intimidated by the legal ramifications of legally binding security
oaths.
Blackmail
can therefore be used as a substitute to secrecy oaths and
non-disclosure agreements during recruitment into the Network, but
should always be perceived by recruited members as part of an
initiation into a group and not as part of the Network. The blackmail
procedure will serve to bind a new member to an oath of silence and
commitment to that group, and must be as effective as a secrecy oath
or non-disclosure agreement would be. It will normally consist of
recording the new member engaging in a suitably compromising act,
with the recording being secured as insurance against any breaches
that could jeopardize the Network and its operations.
There
are two basic types of blackmail that are used: sexual and criminal.
The most widely used blackmail is sexual blackmail that can be used
to destroy a member’s character, social status, and reputation.
When more effective blackmail is necessary, it will involve criminal
acts that can go so far as to involve murder.
Since
blackmail is a criminal act and the upper management levels of the
Network seek to distance themselves from all responsibility for
activities that its members engage in, these blackmail operations are
executed in such a way that responsibility for them or anything at
all that might go wrong will fall on individual members or member
groups in order to maintain the security and functioning of the
Network. This will necessitate providing a certain degree of autonomy
of the groups that perform the blackmail procedures, and includes a
certain amount of freedom in the decision-making abilities that
certain members of these groups have (or at least the perception of
such freedom and autonomy) that don’t require prior authorization
by upper management levels of the Network. Only members who have been
properly programmed and trained for special tasks are ever given
clearance for such decision-making abilities, and only as far as
specific tasks and activities require.
Recruitment
or initiation that involves collecting blackmail insurance must
always be done under the guise of a member group, and in such a way
that the recruit doesn’t know that the group is part of a larger
network. Only after collecting blackmail insurance and establishing
oaths of silence and commitment might the new member be brought
further into the Network itself. In this sort of situation, the
recruit might think that he or she is being initiated into a club,
secret society, cult, etc., and will undergo an initiation process
that will usually involve the recruit voluntarily putting him or
herself into a suitably compromising situation that is recorded and
secured as blackmail insurance. In these cases, the recruit will see
it as a proof of loyalty to the group they are involved with, and
will be led to believe that only that group knows about the
compromising act they engaged in.
Sometimes,
a recruit might need to be put into a blackmail situation
involuntarily, in order to garner their full cooperation when a
voluntary blackmail situation isn’t possible. Whatever the case,
the blackmail procedure should guarantee that the recruit will want
to remain loyal to the Network (through the group) and never speak
about their knowledge of it or its activities. The most important
thing when collecting blackmail insurance is that it should always be
seen to be tied to the member group, and not perceived as anything to
do with the larger Network.
Blackmail
is only used with certain types of members within certain types of
member groups. As mentioned earlier, there are both voluntary and
involuntary blackmail situations. A voluntary situation is where a
staged act that compromises the member is previously agreed on
between the new recruit and other group members, usually as part of
their initiation into the group and for binding their loyalty to that
group through a secrecy oath.
An
involuntary blackmail situation is less straightforward in how it
might be carried out, and this will usually depend on whether any
compromising material can be discovered about the recruit, or can
otherwise be created. This will involve assessing the recruit’s
main weaknesses and then creating staged situations to tempt those
weaknesses, leading the recruit unsuspectingly into the compromising
act. In either case, the compromising act is recorded on tape, and if
the blackmail is involuntary, then the recording will be presented to
the recruit and it will be made clear that it will be used against
them if they should ever disclose anything about the group or its
activities. Involuntary blackmail is more commonly applied to
recruits who are not part of any group tied to the Network.
Although
blackmail offers the obvious ability to force a person to act against
their will and do the blackmailer’s bidding, the Network is
designed so that blackmail can be used to make them act willingly,
without conscience or remorse. The Network selectively and gradually
introduces certain members to a completely different form of life
than normal, in which their exposure to this new lifestyle is
carefully controlled and their perceptions molded so that they begin
to be conditioned to accept a new set of attitudes and behaviors that
they come to live by. Blackmail operates through the level of guilt
or fear that can be associated with it. In other words, the more
guilt a person feels towards a compromising act that they have been
involved in and the fear of being found out, the more effectively it
can be used to control them. The easier it is to control them, the
easier it is to lead them into further compromising acts to increase
the guilt and strengthen the effectiveness of the blackmail
insurance. A member under the pressure of blackmail seeks any means
to alleviate their feelings of guilt, including the use of
scapegoats, and these are provided through the Network in the form of
targets. As a member progresses into the deeper levels of the
Network, their perceptions slowly change and they are influenced to
see targets as more guilty than they are, and this can serve to
alleviate their own guilt in acting out against those targets.
Using
blackmail insurance to secure a member’s silence and continuing
cooperation and participation in Network activities also provides a
means to lead these members into certain deeper levels of the
Network’s structure, where certain types of special privileges or
rewards can be made available if they take part in certain Network
activities that lie outside of ‘official’ operations. These
other activities, referred to earlier as ‘special projects’, are
designed to keep members engaged in Network activities, while also
serving to strengthen their loyalty and oath of silence. Unless a
member is receiving adequate mind-control programming to make it
unnecessary, suitable blackmail insurance is absolutely required
before a member can be cleared to participate in any of the
activities that take place at the deeper levels of the Network.
How They Test the Code of Silence
It’s a matter of routine for those who keep secrets in taking steps to assure that those people who are party to those secrets are trustable. There is a standard method that is used for assuring and testing such trustworthiness. Within all groups that are part of the Network, members will be required to immediately report any inappropriate activity that they witness other group members engaging in. This will include saying anything about the Network or its activities. The members will also be made aware that their trust will be tested from time to time, in that a staged security breach or breaking of the rules will be conducted that they will witness, usually by someone they are known to be friends with or who is their superior within the group, and their reaction to this staged breach will be used to determine their trust. The member will never know whether a breach is a test or not, and will therefore be forced to report them, or face the possible consequences for not doing so. Since this is a secret government program involving non-disclosure agreements and secrecy laws, as well as blackmail, the member who doesn’t report a breach will be facing potential criminal repercussions, or equivalent damage to their life (including targeting), for failing to comply. The method described here is very effective for testing a member’s loyalty and trust, either towards another member, a member group, or the Network itself.
This
method of testing and maintaining the code of silence will also
assure that information regarding a target is safe to disseminate
among Network members, and the content of that information could
therefore be quite extensive. This means that this information does
not have to be accurate, as long as each member who receives it
believes that it is and can never discover otherwise.
The Network’s Underground Society
An
underground society exists deep within the Network, unknown of by
many of its members, and certainly not by anyone who isn’t a
member. Access to this underground society and its activities is only
given to those members who have been properly initiated into it. Even
among those members who have access to it, most of them will only
have access to limited parts of it, and only if they meet strict
security protocols and have been cleared to take part. These
protocols absolutely require that blackmail insurance is first
collected, or that adequate mind-control procedures are applied that
will guarantee the member’s cooperative involvement. Although
blackmail insurance has traditionally been collected when recruiting
members into this underground, it’s being phased out as more
sophisticated methods of electronic mind-control are being more
widely incorporated into the system.
On
first exposure, this underground might be seen by its newly
introduced members as nothing more than activities that lie outside
the Network itself, either as part of the member group they belong
to, or by invitation from other members who they don’t know are
members and who have been specifically tasked to invite them to
participate. Only through progressive exposure to and involvement in
certain activities does a member learn anything about the
underground, and all of this is carefully controlled at every step.
Many
of the people who are brought into the Network are severely lacking
in any morals when they’re recruited, and are therefore easy to
involve in the deeper levels of this Network underground, and quickly
gravitate to taking part in it. These particular members are usually
connected to the Network through fringe groups, such as street gangs,
motorcycle clubs, drug or prostitution rings, police informants,
etc., but not necessarily. Many members who end up in the deepest
levels of the underground are just as likely to be business
professionals, police officers, teachers, and church leaders.
The
easiest members to draw into the Network’s underground, however,
are young adults, and sex is the most popular enticement.
Sex
is a major weakness for a lot of people, and it’s routinely used
within the Network as a means for collecting blackmail insurance, but
also for pleasure and entertainment, which is made available to
members of the underground through various special projects.
Sex
can be used to draw in new recruits, and special groups have been set
up within the Network that operate as sex rings and are regularly
used for recruitment purposes, usually assisting in collecting
blackmail insurance, but also to provide ‘rewards’ or
entertainment privileges for members. Some of these rings are
exclusive to select members in the Network, but there are also sex
rings set up that cater to a wider membership, and are made available
to any member who has gone through an initiation and provided
blackmail insurance as an oath of silence and loyalty. Until a member
has done so, they will never be aware that these rings exist, but
when they do, a whole new world is opened to them that will draw them
further into the Network. These members join into the lifestyle of
the underground, where sex is heavily promoted and widely engaged in
between members of these rings. Drugs are also cheaply and easily
available to Network members once they have entered into this
underground. Corruption is the main purpose of these underground
activities, and it is part of the design of the Network system to
bring as many members into it as possible. Since members are signing
a lifetime contract when joining the Network, and young people are
more easily enticed into corrupt activities, they are the most likely
to eventually be drawn in, and their total corruption is only a
matter of time.
The
sex rings in particular provide an enticing introduction into a
secret world with darker motives. Sex is used to tempt members into
an underground society that caters to every sin and pleasure
imaginable. This underground society is used to lead these members
into ever deeper and darker levels of corruption. As soon as they get
involved in the Network at this level and discover that they have
this whole new source of pleasure and excitement available to them
and they begin to explore it with a little guided influence, there’s
no turning back for them.
One
of the things that I feel is taking place at even deeper levels of
this Network are actual satanic activities, including all manner of
ritual abuse, satanic worship, and even human sacrifices. These
activities are engaged in by those who control this Network, and this
Network is their means for drawing the entire population into this as
well. Therefore, they must maintain very tight security against its
exposure, so full-blown mind-control is a necessity for any members
who will reach these darker levels of the Network’s underground.
This mind-control is applied to the extent that each member will have
one or more ‘alter’ personalities created in them (either through
trauma or hypnosis), and will be completely unaware of the fact. The
different personalities are switched in and out through triggers, and
prior programming will assure that these members are incapable of
remembering or otherwise discovering their involvement in these dark
activities. As the Network continues to draw in its members, more and
more people are being led into these satanic aspects and being
enslaved through this most insipid form of control.
Membership Motivations and Rewards
Members
of this Network aren’t usually paid, but instead they will either
volunteer themselves freely, be tricked into it, or forced. Usually,
they begin doing it as part of something else that they’ve already
committed themselves to, such as a church or business organization,
and their Network activities are seen by them as part of their
current commitments with that group. As such, neither the existence
of the larger Network, nor the group’s connection to it, has to be
known about by more than one or a few in their group (usually in
leadership positions), and even then, their knowledge of the Network
is still very limited. A group’s involvement in Network operations
is just seen by its members as serving the group’s interests. Those
members of the group who know anything about the larger Network will
usually be affiliated with it through membership in another group and
will be acting through their service to that other more deeply
involved group to involve the current group in serving those
interests as well.
Motivations
to act in favor of the Network’s needs are provided to individual
members or groups with carefully crafted cover stories that are
specific to that member or group and are usually crafted around
whatever a group’s official purpose is, or whatever can be used to
motivate a member to take part in various tasks and operations.
Usually, a member or group can be motivated with a simple appeal of
‘service to community’. Many people feel obligated and even
honored to do something for their community when approached and asked
in the right way, and so they can be easily led to think that they
are doing so when they’re involved in Network activities. When they
see the level of sophistication that’s used in these operations,
they automatically assume that what they’re doing must be important
and under the direction of a legitimate authority, no matter what
they might be drawn into doing.
Of
course, other motivators exist, as we’ve already seen, and these
are used to draw in those people who aren’t so easily motivated by
a sense of duty or obligation. In fact, these are the preferred type
of people to draw into the Network, because they’re already closer
to the mindset that this Network is intended to develop within the
general population. Selfishness, greed, carnal pleasures,
criminality, etc., are easier to take advantage of and use to control
a person, so cultivating these traits serves the ultimate purpose of
the Network.
As
we’ve already seen, reward systems have been set up to cater to
member’s pleasures in various ways, but these aren’t the only
reward systems that exist. Virtually anything might be offered to
entice a member to do the bidding of the Network, since those who
control the Network have the power to fulfill just about any desire
that a person might have, and people are always seeking pleasure and
excitement.
Special
projects are set up at the deeper levels of the Network that are
involved in catering to the pleasures of members or rewarding them in
some way. These special projects involve activities that might be
carried out by a single member group, or they can be broken up into
compartmentalized operations that involve various members or groups
who perform their assigned tasks in isolation and remain unaware of
the fuller operation, which will be an ongoing enterprise of some
sort, such as a free adult website for members that exploits the
private lives of targets.
Exploitation
of targeted individuals is a high priority of the Network. In the
example just mentioned, the tasks will be divided up so that one
member might be tasked with entering a target’s residence and
planting cameras in strategic locations such as the bathroom and
bedroom, another will be tasked with capturing and editing footage
and uploading it to the website, and another with maintaining the
website. None of these members ever have to come in contact with the
other members involved or know who they are or what they do. The
member planting the cameras can be kept totally unaware of the
exploitative purposes the footage will be put to, and might be led to
believe that the cameras are for general surveillance purposes. The
member who handles the editing of the footage can be kept unaware of
the identity of the target and where they reside (which might be
anywhere in the world). The webmaster can also be kept unaware of
this information about the target, and may even be led to believe
that the footage they receive is voluntarily submitted by people who
are exhibitionists. Members who are given access to the website and
can view this footage can be led to believe whatever they might be
told, perhaps also believing that the target is an exhibitionist.
Selected footage of a target might be made available to members that
live in the target’s community, in order to influence those
member’s actions towards the target, or it might be made available
only to members who will never come in contact with the target, and
offered as ‘entertainment’. Such a website might offer thousands
of different video channels to choose from, so that a member can
eavesdrop on any number of targets, watching and listening to them in
the privacy of their own homes.
The
above example is just one type of special project that is used for
motivating and rewarding members who are admitted into the Network’s
underground, and the possibilities for motivating members through
rewards and exploiting targeted individuals is virtually unlimited.
The Network Phone System
The Network relies on various technologies to effectively keep all of its members invisibly ensnared within its electronic web of control and operating in isolation to each other. Every member requires a cell phone in order to take part in Network activities, and the cell phone provides a means for central command to track, communicate with, and monitor each member. Cell phones are very important to the functioning of this Network and its ultimate goal.
Those
who are responsible for putting together this Network have thought
very carefully about the security of their system and know that
Network members will often be sloppy and stupid, so they have taken
pains to secure against this while conducting their operations
through cell phone communications.
With
the levels of power of those who are involved in creating and
maintaining this secret Network, the ability to bypass or change
standard phone operating functions are relatively easy, and a
member’s cell phone might be specially configured so that normal
functionality is enhanced in order to implement special security
measures against that member’s potential sloppiness or stupidity.
What
follows describes how the security of the Network and member
activities are able to be preserved against anyone who might
accidentally come across a member’s cell phone. This section is
intended as an outline so that readers can gain a better perspective
of the situation and how it can be accomplished without any chance of
exposure, and to show how gang-stalking operations can be conducted
efficiently while maintaining tight security measures. Should someone
outside the Network ever come across a member’s cell phone, this
could otherwise lead to the Network’s exposure if any suspicious or
incriminating information was ever to be discovered on the phone
(such as command center telephone numbers, text messages related to
operations or targets, etc.). Therefore, this section describes how
precautions might be taken to minimize any possibility of discovery.
It will serve to answer questions that any doubters might have as to
the possibility that such a secret Network could ever possibly exist
without risk of exposure.
Securing
communications between central command and participating members:
- All Network communications must be strictly conducted through text-based cell phone calls.
- Member’s cell phones are registered on the central computer, and only calls from registered cell phones will be allowed to connect.
- A member’s registered cell phone is required to use a nondescript name entry for the command center phone number held in the cell phone directory listing. A silent ring-tone should always be assigned to this number. The cell phone will also be configured so that text messages sent to or received from the command center can’t be saved or forwarded.
- Members are assigned a personal identity number and must use it when calling into the Network commend center. This is necessary to validate who they are and to secure against unauthorized access by non-members. This personal identity number must be memorized for security reasons, and never written down or recorded anywhere that it might be found by others.
- Member’s cell phones must have a phone lock feature activated whenever the member is away from their phone, with a special identity number that must be entered before any communications with the Network can be initiated. This further assures that there will be no unauthorized access to the Network or Network communications by non-members.
- Lost or stolen cell phones must be reported immediately through a special 1-800 number in order that it can be deactivated from the system.
The
above measures will effectively secure the Network against discovery
and infiltration by non-members who might gain access to a member’s
cell phone and attempt to connect with the commend center or
otherwise discover confidential information related to the Network or
its activities.
The
weakest link in this system, no matter how it might be designed and
operated, is going to be the carelessness of the participating
members. The Network system is capable of implementing special cell
phone hardware or software measures that will enhance a cell phone so
that communications to and from the command center will be far more
secure than could normally be possible with ordinary phone features.
Such enhancements will include disabling copying, saving, and
forwarding of Network communications. It will also include special
monitoring capabilities, to assure that the cell phone isn’t
tampered with. That any member’s cell phone should fall into the
wrong hands and risk exposure of this Network, the participation of
that member, or any details of Network activities or targets, demands
that such special hardware/software enhancements are used, making the
phone security measures listed earlier far less necessary.
Nonetheless, the foregoing outline should give readers an idea of how
such a system might be designed so that it would allow for secure
cell phone networking and communications to be implemented.
The
one thing that can’t normally be easily hidden on a member’s cell
phone will be the phone number to the Network command center. Special
enhancements can be made to the phone so the Network number isn’t
even needed, and all Network communications can be automatically
received and then erased once they’ve been viewed by the member, or
after having been written and sent by the member. With this sort of
setup, incoming Network calls will have special coded ring tones to
signify various types of calls[1]:
Ordinary
(non-network) call ring tone 1 (normal ring)
Network
Query ring tone 2 (silent/vibrate 1)
Network
Alert ring tone 3 (silent/vibrate 2)
Network
Task ring tone 4 (silent/vibrate 3)
An
ordinary incoming call will have whatever ring tone is normally
assigned by the owner of the phone. Network calls, however, are
always silent for security reasons, and might be one of three
possible types: a query, an alert, or a task. A query call is an
incoming Network call seeking assistance in an operation. An alert
call warns when a target is in the immediate vicinity. A task call
gives instructions to a member during an ongoing operation. These
incoming communications are answered by entering a special key
combination to bring it up on the phone’s screen.
There
can also be a simple code system that’s used by members for
communicating to the network’s command center. In order to respond
to a query, alert, or task, the member enters a simple one or two
digit code, depending on their response. If the member is inactive or
on standby and wants to reject an incoming query for assistance, they
might press 0 and then ‘send’. Otherwise, they might press 1
followed by ‘send’, and the command center would automatically
respond back by sending more information about the query, which can
be immediately displayed on the phone’s screen until another button
is pressed, at which point it’s deleted.
This
phone system is designed to make Network communications as secure and
efficient as possible. During an operation, all participating members
will be directly linked to the command center and their phones will
receive and display Network messages instantaneously without the
member having to press any buttons except when a response is
necessary. This allows members who are engaged in a street theatre
operation to receive information and instructions more quickly and
perform their tasks more easily and with complete anonymity to other
participating members while still maintaining the coordination of
movements and timing. There are no delays in communicating like there
are with normal cell phone communications, and the specialized
functioning of the member’s cell phone makes it virtually
impossible for these communications to be non-secure.
It
is my experience that a target’s picture often seems to be
circulated with any alert messages concerning the target that are
distributed through the Network. These pictures will be updated as
regularly as possible, and it’s not unlikely that there will be a
gallery of different pictures and video clips of each target that are
stored on the Network system that can be made available to members
for their perusal, in order for them to familiarize themselves with a
particular target’s appearance so they can properly identify them.
However, for security reasons, a Network member will never be able to
copy or store any of these pictures or other information on their own
cell phone (or computer), and can only view them while connected to
the Network.
The
main foundational structure for this Network is the global electronic
communications network. This provides the means to tie all of the
other components of the system into this Network, which have each
been introduced in rapid succession immediately after this foundation
was in place. After the communications network was put in place, the
proliferation of computers and computerized automation was the next
component of the Network to be implemented, which serves to allow for
a massive surveillance system (ECHELON) that was immediately put to
use in compiling information on every individual and group within the
general population. Immediately after this came the introduction of
cell phones, which provided a way to expand the surveillance and
information gathering while also providing the platform for applying
mind-control programming to a large part of the population while
being able to tailor that programming on an individual basis. Cell
phones also offer tracking capabilities through internal GPS chips.
Cell
phones have been very useful in the gang-stalking operations that
Network members routinely engage in, and these operations are quickly
becoming the new method of policing and punishing more and more
people within the population who are becoming listed as targeted
individuals. Cell phones are the main tool used in these
gang-stalking operations, acting as a member’s only link to the
Network and other members. Cell phones provide communications between
Network members and central command in such a way that strict control
of both the members and any information they might be privy to is
always controlled and contained, assuring the continued security of
the Network, its members, and its operations.
Cell Phones and Mind Manipulation
Most
people own a cell phone and carry it wherever they go and are using
them more and more often in communicating with friends, family, and
whoever else they might ever talk to, and this not only makes cell
phones perfect tools for surveillance, but also for mind-control.
This is because a cell phone is capable of transmitting microwave
frequencies that will affect the brainwaves of anyone standing within
a few feet of it. Specific frequencies will induce specific symptoms,
such as confusion, paranoia, aggression, suggestibility, etc. When
the cell phone is held to the ear, these effects are much more
intense. Cell phones can also be used to send subliminal audio
messages via pulsed microwaves (V2K) to affect a person’s thoughts
and actions without their awareness.
Members
are expected to always have their cell phones nearby in case they
need to be contacted in an emergency, and they might be told that
it’s for their security against dangerous targets, or because they
might be needed in an operation, but mind control is a significant
part of the reason as well. As members become involved with the
Network, they will be continuously subjected to very sophisticated
electronic mind-control programming techniques day in and day out,
and will never notice anything. The mind control will begin with
basic behavioral conditioning through a continual stream of
subliminal suggestions that can be custom designed for each member,
based on psychological profiles that will reveal characteristics
about them that can be taken advantage of for manipulation. These
subliminal suggestions can be transmitted whether or not the phone is
turned on, as long as it has a power source.
Subliminal
programming has certain limitations. Its effect is short lasting when
a suggestion is applied for only a short time, but when it’s
applied regularly over a longer period, it begins to have a stronger
and more lasting effect. Short-term effects are useful for
influencing a person to immediately act a certain way on compulsion,
while long-term effects are best suited for changing a person’s
general attitudes and perceptions of things.
Specific
microwave frequencies that affect a member to cause such feelings as
aggression or fear can also be applied to members, but this is
reserved for when it is most useful, such as at the precise moments
when a member is in close proximity to a target, so as to help in
influencing a desired response from that member as part of an
operation.
Another
more powerful form of mind control that can be applied through cell
phones involves electronic hypnosis, which is effected through the
use of specific electromagnetic frequencies to entrain the brainwaves
of a person and create a temporary state of high suggestibility in
them. After such a state is induced, suggestions or commands can be
subliminally inserted directly into the subconscious without the
person noticing anything unusual.[3] Hypnosis is far more versatile
than subliminals. The hypnotic suggestions or instructions can be far
more elaborate, and detection of being hypnotized is virtually
impossible, both during and after the fact. Hypnotic suggestions or
instructions will also have a much stronger and more certain effect
than subliminals.
A
third level of mind-control depends on whether a person has been
implanted, and a cell phone can again be used to relay signals to and
from the implants, so that signals can be sent to a specific person
without affecting anyone else in the vicinity who has also been
implanted, and very weak signals from the implant can be picked up
when the cell phone is held to the ear.[4]
No
matter what form of mind control a person might be subjected to, the
Network can be used to control and direct them. Each Network member
is certainly being subjected to mind control in one form or another,
and in many cases it may even go so far as to involve trauma-induced
alter personalities. Whatever the case might be, its application is
always kept very covert and measures to safeguard against its
discovery are taken whenever possible. Members are usually kept
completely unaware of being manipulated and think that they’re in
full control of their own thoughts and behaviors when really they
will do whatever they’ve been instructed to do.
Each
Network member undergoes a long-term programming schedule that’s
been carefully designed and follows a regimented procedure to assure
that it’s properly implemented and failsafe, and greater control of
that member is achieved over time. This requires that progressive
levels of mind-control programming are established in each member and
each level of programming will have a particular intended result that
must be fully achieved before that member will graduate to the next
level of mind-control. Each of these levels of programming will be
reflected in their level of involvement in the Network and its
activities, so that the higher the level of programming, the more
involved a member will be in Network operations and activities, and,
more importantly, the more controllable they will be. Since the
ultimate intention of the Network is to create a totally
mind-controlled society of unwitting slaves who will serve the
satanic elite, covert mind-control programming will begin to be
subjected to every Network member as early as possible.
The
different levels of mind-control that members will undergo can be
assumed to follow a general progressive order to achieve certain
necessary requirements. The first and foremost of these requirements
is the continued security of the Network and the activities of its
members. Further levels of programming will be more task-specific,
and each group within the Network will have specific methods of
mind-control programming for its members. Each new member of the
Network is categorized according to the member group that they are
recruited into, and that programming is further tailored for them
depending on their psychological profiles, social situation, special
skills, attitudes and beliefs, etc. Each of these groups will be
designated general mind-control programming scripts according to the
organization of that group, its goals, the type of activities it
normally engages in, etc. Network members will be further categorized
according to their usefulness in respect to the needs and goals of
the Network, and further mind-control programming will be tailored to
suit these needs and goals.
Although
mind-control is a part of every group in the Network, the groups
themselves will usually have no knowledge of this fact and it will
all be handled covertly by the upper management levels of the Network
and initiated solely through the Network system. The only exception
to this is when a particular group has been cleared for involvement
in special projects. There might be certain actions that members of a
group will engage in as part of another member’s programming, but
when this occurs, these actions will be conducted under some other
pretext that relates to the normal activities of the group.
Sometimes, a Network member might undergo special programming
sessions where another member will be used to handle special
programming procedures, such as when creating an alter personality in
a member, which requires a specially trained programmer. Certain
carefully selected members of the Network are trained in these skills
and used for this purpose.
The
first level of mind-control that all members are subjected to is the
establishment of the loyalty of the member so that they will never
reveal what secrets they might ever become privy to as part of the
Network. This subjection might go so far as to involve trauma-based
mind-control to create one or more alter personalities that can be
called up to take over the member’s consciousness whenever they’re
to be used in Network activities, but this is usually reserved for
the deeper levels of initiation that are usually only ever reached by
certain members and groups within the Network. More commonly, a
member will undergo less intense methods of mind-control to achieve
the required results. This is most often achieved through the use of
advanced hypnosis techniques coupled with ongoing subliminal
reinforcement, as described above.
Each
level of mind-control programming will be dependant on the
effectiveness of the previous levels, as well as other factors listed
earlier on in this document. Since members of the Network are
effectively making lifetime commitments by involving themselves in
this system, much of the programming will be established for
long-term involvement, and it will be progressive in its development
so that neither the member nor anyone else will likely ever notice
any changes in their personality. However, the member will be changed
over time, most notably in their beliefs, attitudes, morals, and
values, in order to become more compliant with Network goals and
activities.
The
Network is technology-based, with a carefully designed structure that
serves to trap members within its sticky web so that there is no
escape once they become involved. This Network has been long in
planning and each component of the final overall structure has been
carefully put in place each in turn and without it being obvious what
these components effectively add up to now that they have all been
connected together. Since the inception of its early technological
roots, the Network has grown and expanded from isolated pockets of
individuals and groups into a globally reaching interconnected web of
control that has the capability to not only monitor and direct the
events that take place in the lives of the individuals of an entire
society, but also to mold and manipulate each of these individuals to
think, speak, and act in whatever way the controllers might desire.
Further, the Network incorporates whatever means will work to corrupt
these individuals and break them from the morals and ethics that
would otherwise allow for a peaceful and cooperative society based on
respect and understanding. The Network is designed to destroy these
higher ideals in the human species, and replace them with the
perception of continual chaos and uncertainty that leaves every
individual and group at the mercy of those who control this system.
Those who join the Network become trapped inside of it. Those who
don’t join become trapped outside of it.
Notes
[1]
See Social
Self-Destruction: A Secret War of Controlled Chaos at
[2]
I urge readers who have not heard of these health and safety laws to
research them further in order to understand how this reporting
system works and how widespread it is.
[3]
This method of mind-control incorporates RHIC-EDOM (Radio Hypnotic
Intracerebral
Control – Electronic Dissolution of Memory), which can
remotely induce a hypnotic state in a person, deliver suggestions or
instructions, and erase all memories and awareness of both the
programming and the actions to be performed.
[4]
Due to their very small size, electronic implants can only generate
weak signal transmissions, and require some nearby relaying device to
amplify the signal before re-transmitting it over greater distances.
A specially rigged cell phone makes an ideal re-transmitter.
No comments:
Post a Comment