Friday, February 15, 2013

Gang-Stalkers in the Family - My 'Brother' Garry Forwood


By Anthony Forwood


My initial gang-stalking perps included my immediate family members (brothers, sisters, and mother).

Before I fully realized this and was almost at the point of permanently separating myself from them anyway, (due to years of psychological abuse) in 2005, my oldest brother Garry Forwood offered to give me his old laptop computer because I was starting to do a lot of writing. I thought this was just one of his rare gestures of kindness towards me that didn’t have strings attached (usually they did), but within weeks of getting it I realized that it was only given to me in order to spy on me.

Garry Forwood - Satanist

When he told me he was going to give it to me, he said that he needed a few weeks to remove all of his personal files and reinstall the basic software. This should have only required a few hours at the most, but at the time, I didn't question it, even though I did think it was an unusually extensive amount of time.

Soon after I received the computer, I started noticing weird activity on it more and more. Most significant was the fact that the hard-drive light would flicker every few seconds, no matter if the machine was being used or not. I went through all of the settings in order to try to figure out why it was always showing this hard-drive activity. I shut everything down that I could find that might be causing this (there was really nothing that I could find that could have been causing it). The only thing I didn't shut down at that point was the remote-access features. At the time, I wasn't thinking that it was being accessed that way. I just thought it was something to do with the Windows software settings.

Then, one night I woke up at 4:00 am to find the hard-drive light flickering madly. It kept going for a long time, and I was unable to log on because of it. I had to cut the power to stop it.

That was the point that I first suspected that someone might be remotely accessing it. Because of the strange way my brother had responded to my earlier claims when I told him that I suspected I was under surveillance for some reason, my suspicions of him grew. He had actually said that he thought I was brain-damaged for suspecting this. Why would my own brother tell me that he thought I was brain-damaged rather than to listen to what I had to say about my suspicions? My room was being illegally entered, and people in my building were acting strangely – the typical gang-stalking tactics that most targeted individuals (TIs) experience early on. I didn't know I was being gang-stalked at this time. I hadn't even heard of the term yet.

Anyway, after waking up to find the hard-drive spinning madly, I shut down all remote-access functions on the laptop and put thick tape over the remote sensor on the back of the computer. After a few days, the computer stopped acting weird. The hard-drive light would still flicker every few seconds for quite a few days afterwards, but eventually it stopped altogether, for the first time since I took possession of the machine. It seemed to me that there was some sort of spyware program installed that may have been sending everything I did on it out through the remote port automatically, and after the port had been shut down it continued to try for a while until finally timing out and giving up. I've never turned remote-accessing back on or connected it to the internet since then, but I'll bet that if I did the activity would start again.

I can assume now that my brother needed those two weeks to install some sort of spyware. He's shown himself to be the sort of character that would sell out his own brother for the sake of his own sense of comfort, as I've found out.

The more I think about him, the more I realize how likely he's been deeply indoctrinated into the fascist world of the mind-controllers. It’s really a pity that I have to think this, because he’s family and I used to really like him and look up to him. But I had deluded myself, basing my view of him on trust and faith and automatic respect rather than taking into consideration certain facts, which follow:

* He belongs to a church (First United in Burnaby, BC) and is heavily involved with it (on the board of directors), yet he doesn't really have an ounce of religion in his bones. He's a phony Christian. He had told me before that he only got involved in the church because his wife was.

* He worked for about 35 years for the same telecommunications company - a definite front for intelligence organs to recruit domestic spies (particularly after 9/11). This was a government-owned company (BC Tel) when he started there, but was bought out by an American telecommunications company (AT&T?) in the early 1990s, when domestic spying first started becoming rampant (the name of the company was changed to Telus, which is a rather revealing name). When my brother first got a job at this company, he had made an off-hand comment to me about having to wear 'golden handcuffs', meaning that he was tied to his job for life, but the money was excellent. (Note - When you work for the intelligence agencies, even just as an asset, you’re permanently owned by them due to secrecy oaths.)

* At a certain point when he was with this company, he and many others there got 'sick' from what they were told were toxins coming from materials used in building the new offices that they occupied. I've since discovered that this is what is sometimes reported when people are exposed to mind-control programming (such as when hypnotic chemicals are used, or from the adverse after-effects of electronic mind-control technologies). (Google “sick buildings mind control” for more information on this.)

* He only ever talked to me about what he does on his job one time, and he was very vague about it and quickly changed the subject. What he told me was in relation to a project he was involved in, which had to do with designing some sort of computer software system called ‘Navigator’ (not the Netscape software) that was to be used by telecommunications companies across Canada. Other than that, I had no idea what his job involved.

* He became progressively more arrogant and secretive towards me over the years.

* He owns a very powerful computer system that he doesn't seem to really have any need for. I’ve since discovered that his job is directly related to computer engineering, so he’d definitely know how to set up and use spyware.

* His wife, Gloria Forwood, is a strange case. No known background, no living relatives, very quiet and unassuming. She worked as a guidance councilor at a high school or college. She brought my brother into the church scene soon after they got married. My brother married her after only having known her for a few months (according to what he told me around the time they got married). In all the years that they’ve been married, she’s never said more than hello to me.

* He accepts all mainstream news as the truth without question, and refuses to believe that there could be any extensive corruption in government.

* He claims that all science and technology is being used by governments and major corporations for strictly positive ends (positive for whom?). He also told me at one point that he believes that electronic implants are a good idea and wouldn’t ever be abused.

* He refuses to back any of his opinions or beliefs, and this is probably because he knows he can't because what he claims is wrong. At the same time, he harshly criticizes my own beliefs and opinions, and refuses to consider any evidence that I’ve offered in the past to support them.

* He has expressed the belief more than once that humans are inherently bad, and that the world would immediately be reduced to anarchy if the government didn't impose the ever-increasing level of control over the rest of us that it does.

* He seems to have a fairly small and closed circle of friends, almost exclusively derived from the workplace and church.

Ultimately, my oldest brother Garry fits the description of someone who would be an ideal candidate as a mind-controlled (or heavily conditioned) intelligence operative. I now suspect very strongly that he is one, or is working for an intelligence agency under contract as an asset. I am able to provide even more background information on him that would help to support this suspicion further, but I'll save it for when he might choose to defend his name, if he ever has the courage.

As it is, I can no longer trust anything that this person has ever said or done, or will ever say or do, beyond the above. He is certainly corrupted in his beliefs. He has apparently sold his soul to evil powers, and this may have occurred so far back that everything negative that has taken place between my family and me has been largely influenced by his hand. He was the number one son in my mother’s eye, and her always trying to convince me that she loved us all equally while always giving him by far the most love and attention certainly spoke otherwise.

My immediate family has become the worst group of people I have ever known for treating me so badly. They have all created so many issues with me for such petty reasons that I don’t know where I would ever start in trying to correct them in their thoughts about me, although I’ve tried countless times. They don’t really know anything about me, and have never taken any interest in knowing. They only assume the things they think they know about me, and they’ve obviously been manipulated further (By each other? By the police?) to despise me and ostracize me, particularly since our mother died in 2002. They seem to have taken extra steps to turn others against me as well, including my nieces and nephews. I would wish only that I was given the opportunity by each one of them to hear their claims against me and to be able to fairly engage them in a discussion of these things, and to have them answer for themselves about their thoughts and beliefs regarding me, individually. But, unfortunately, as liars and cowards will do, they carefully avoid this and continue to sustain their lies and false beliefs by pretending such superiority over me that they feel they don’t have to be so honorable and fair. They use excuses, rather than reason. They have failed to be honorable as family members, and pretend that I’ve treated them so unjustly in the past that they’re excused from having to do so. The truth is, I have done nothing to any one of them to deserve the sort of abusive treatment they’ve continually subjected me to throughout my life. The point here isn’t to complain (as they would surely accuse me of doing), but to point out their gang-stalking attitude.

As long as they wish to maintain such an attitude towards me, then it’s only fair that I speak my thoughts about them out in the open, no matter how negative those thoughts might be. It’s far more just than to speak about me behind my back, so that I can’t defend myself against their lies and distortions.

If any of the Forwood family or any of their friends feel the urge to respond to this (I doubt any of you will, because you’re cowards), you had better be prepared to back anything you say with credible evidence to prove your claims about me, and you had better be ready to prove that I’m wrong about you if you plan to deny any of what I’ve said. But I know you hide from me now, like the evil, soulless cowards that you all are.

As it is, I now have physical evidence that my brother Garry Forwood was indeed spying on me through the computer he so generously ‘donated’ to me, which I have every intention of hanging him with for attempting to invade my privacy and sell me out to his satanic comrades. To be specific, I was able to locate a spyware chip that he had installed on the computer he gave me, which is now being held in a secure place, ready to be produced and used as evidence against him in court, if need be. Because this piece of evidence confirms all of my prior suspicions, I am now going public about Garry Forwood, with the full intention of destroying any association he has with the neo-fascists in government who are subverting all of our rights and freedoms in an attempt to gain complete power over us.

The New World Order is certainly here, but the spoken truth is my freedom.


Wednesday, February 13, 2013

Why Implants Aren't Used

by Anthony Forwood


Again and again, I come across the claim that implants are responsible for what people are experiencing as far as remotely reading their brainwaves This will clear the matter up, and these people should begin to look elsewhere for the cause of their experiences. This is a recent post to me on facebook, and my response:

Karen Oliemans 

Excellent reading Anthony You are, however, completely out of date with your research. Nano tech inside victims using satellites as the in between station to secret service control rooms has overtaken all the tech that you have researched. Mindcontrol.se is the site to look at all the different nano tech technologies that are also being used by rogue syndicates infiltrating big corporations, already since 2006/7 from witness accounts. Dutch TI Sandesh de Rijk is such a victim. Two weeks ago I went to a TI day in Brussels and met with Magnus Olsson who started raising awareness about this evil tech. There is now tech that can cut through your teeth and cause big holes in teeth and arteries. Every human brain has an unique brain energy pattern that can be identified by computer software in a control room (this happens without the use of any equipment on the victim) which is then analysed and further used for experimentation and also for criminal purposes, i.e. to actually control that persons energy fields including thought processes as every emotion has a specific frequency and therefore can be manipulated outside of that person by that special computer and then fed back into the victim. You must go to that website Anthony and read up about this totally horific tech. It is mind boggeling and heartbreaking. These nano tech particles are actual mini computers that can be utilised for mind control of the victim, that is what it boils down to. I cannot help you with other info except that website and also the websites that Flickk Anhuii gets some of his info from. We are together on this Anthony, and we also depend on each other too and only have each other as we are all victims. Stay strong

----

Scientific facts based on the laws of physics do not go out of date. Let me explain something. This is simple physics I'm going to describe, and can be verified by any radio technician.

It would be impossible to remotely pick up signals coming from any nano-sized implant beyond a few inches at best. Such an implant would essentially be a radio transmitter, and would have to follow the same scientific principles that any other radio transmitter does. A radio transmitter can only produce a given amount of amplitude, based on the amount of power it can handle, and this power level is largely determined by the size of the capacitor that stores and builds up the energy for the transmitter's signal. A capacitor has to be larger the more power it must store to gain the amplitude it needs to send the signal the desired distance. Amplitude equates to the distance that a radio wave can propagate. All EM waves lose amplitude with distance. An implant, whether nano-sized or larger, is therefore severely restricted in the amount of power it can use, due to its small size. This means that the amplitude of its signal will be extremely low, and so the distance that the signal will propagate is going to be equally extremely short. We're talking about inches at best. You could have a million nano-devices in you, working in tandem, and still, the combined signals will not add together to increase the amplitude. All you'll get is a very weak field effect of the same amplitude.

Brainwaves are also extremely weak, and can't be read by any device even inches distant from the head and without special shielding to block both natural EM and EM coming from unnatural sources that are constantly propagating throughout the environment. Take a look at what's required for a MEG machine to work. A MEG is the most sensitive device known to be able to read brainwave patterns (more powerful than a PET or fMRI scanner). This is all detailed at the link below, including pictures of the shielding used, to give you an idea of the problems involved.

When you say that "Every human brain ... can be identified by computer software in a control room (this happens without the use of any equipment on the victim)", you are completely mistaken and need to check your facts. My research will help you with that. As I said, scientific facts do not go out of date. My research is based on scientific facts.

If you want us all to be together on this, then please don't expect me to start at square one again, as I've had to do so many times already because people just refuse to look at the research that I've already done for them. I'm trying to make it simple for others to understand where they're wrong, and I've continually provided links to my research, without ever receiving one response that even attempts to disprove it. I just get a continual stream of similar responses to yours by a never-ending string of new people who are misinformed (no disrespect intended). It's very tiring to deal with after a while (I often wonder if it's purposeful).

I don't know offhand what you've seen of my research, but I suggest you look at this:

http://www.scribd.com/doc/82734018/A-Primer-on-v2k-and-Mind-Reading-Technologies-Part-i

If you really want to work together (which is what I'd like as well), then see if you can find among any of your reference material anything that actually describes in this same sort of detail how what you claim is possible, based on known physics. This is what I've been asking for from people who make similar claims as yours for over a year now. Nobody has yet been able to. This includes Magnus, of all people. If that information can be provided, I'll look at it and take it into consideration. What I won't do any more, however, is continually waste my time looking at links that end up not detailing these things. That sort of response only increases my doubts about the sensibilities of other TIs, and makes me suspicious of the sources that put out this false information. Don't you think it's only fair to for others to be able to provide the sort of detail that I do in proving claims? Appeals to the emotions won't make falsehoods into facts. Stick with looking at the science behind the claims. Keep the emotional rhetoric out of it. It doesn't excuse faulty claims.

Thanks for giving me an opportunity to explain this. I hope it helps clear some things up.

Wednesday, November 14, 2012

Evidence of Remote Neural Monitoring, or Carefully Planned Disinformation?

by Anthony Forwood


The Case of John St. Clair Akwei

John St. Clair Akwei claims to have worked for the National Security Agency (NSA) of the US government, and filed a lawsuit against them in 1992 (Washington DC, Civil Action 92-0449) for being targeted with what he referred to as ‘Remote Neural Monitoring’ (RNM) technologies. Many people have referred to this case as proof that these technologies exist, but on closer examination it can be seen that there’s very little to actually substantiate his claims. In fact, there is good reason to suspect that this case was a deliberate disinformation ploy to create the illusion that the NSA has more capabilities than it really does. This is a standard tactic used to throw off foreign and domestic adversaries and protect classified secrets. This sort of disinformation ploy is designed to create a prop that can then be used to lead people’s beliefs about the capabilities of these technologies so that they have a false understanding of the methods used in their targeting and the real methods are overlooked.

Akwei’s lawsuit application has been posted on the Internet in its entirety, and in reviewing it, I discovered that he provided very little information about the technology that would indicate how it operates, nor is there any more than a few sentences regarding the effects he claims to have suffered by these technologies at the hands of the NSA. Apparently, Akwei had no evidence at all to support his claims, or he would have clearly stated this fact in his lawsuit application. In fact, his case was dismissed by Judge Stanley Sporkin on the grounds that it was frivolous. By reading his application, it is indeed obvious that he had no case. I came across one online post by someone who said they had contacted Akwei to find out the results of the case, and Akwei hadn’t been interested in discussing it and didn’t want to be bothered about it.

Nonetheless, because Akwei went so far as to file a lawsuit, many people have come to automatically assume that this somehow gives his claims credibility, and I see his case being cited by one person after another as supporting evidence for their own claims, which makes me suspicious. It appears that his case is being used as part of an ongoing disinformation campaign to influence the targeted public in what it believes about these mind-control technologies and the methods that are used to cause the effects that they are experiencing.

Akwei states that he was in two-way communication with NSA agents who used these technologies to harass him, but he provides very few other details about his targeting beyond this and the majority of his application is filled with background information about the NSA and some details about their purported technological capabilities. Most of this information was already widely available at the time he filed his lawsuit. The only information that might have been relatively new at the time was a few of the more extraordinary claims he made about the technology.

For instance, Akwei describes technological capabilities that I have already shown (see http://exposinginfragard.blogspot.ca/2014/06/a-primer-on-v2k-vs-mind-reading.html) to be unrealistic. For instance, he states (emphasis added):

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. Visual memory can also be seen.

He goes on to state that it is all done non-invasively and “with no physical contact with the subject.” This implies that no special requirements are needed, such as implants or preliminary EEG sessions for learning a target’s unique brainwave signature patterns. However, I have already shown in my previous article how scientifically unrealistic this is.

Like virtually every other person making such extraordinary claims about these technologies (Tim Rifat, Jesus Mendoza, Robert Duncan, Alex Jones, etc.), Akwei fails to describe whatever method might be used that would circumvent all of the problems that have been detailed in my previous article regarding remote mind-reading technologies. He also fails to provide any sources for his information other than a list of references to a number of books and documents that he states he only discovered in 1991 after having notified the authorities and getting no responsive action. This list seems to be the extent of his evidence, and much of the referenced material is familiar to this author and none of it bears evidence that would support Akwei’s more extraordinary claims.

In his lawsuit application, Akwei makes the following claim (emphasis added):

NSA computer-generated brain mapping can monitor all the electrical activity in the brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes.

He also states:

Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived.”

Irrespective of finding some way of overcoming all of the problems described in my previous article regarding these technologies, reading all the activity of the brain, even if it could somehow be done, would require some very powerful computers with incredibly immense storage and memory capacities for each person being targeted. Even a MEG machine can’t read the activity of individual neurons and approximately 50,000 active neurons are needed for the brain to generate a signal that is strong enough to be detectable by it, so the claim that all brain activity can be monitored would require some exceptional science that lies outside of our current understanding of physics. This comment of Akwei's reflects his ignorance of the physical limitations of such a scheme.

But let’s consider this claim a little further, just to properly understand how unrealistic it is.

There are approximately one hundred billion neurons in the human brain, which means that just to capture one millisecond (1/1000 of a second, the approximate time it takes for a neuron to fire) of brain activity for one person, with only one byte of computer memory allocated to each neuron, it would require about 100 gigabytes of storage space per millisecond. One second of monitoring would require 100 terabytes (1 terabyte = 1,000 gigabytes). One hour (3,600 seconds) of monitoring one person would require 360,000 terabytes (360 petabytes, or 360 quadrillion bytes). Multiply this by the number of people that Akwei claims are supposedly being monitored (hundreds of thousands), and it becomes even more unrealistic. Of course, a single byte per neuron is far short of what would actually be required, since it would also be necessary to store and analyze information about each neuron, such as what it does, what its state is, what other neurons it connects to (there are approximately one thousand dendrites on each neuron that connect to other neurons), its firing rate, etc. Each additional piece of information about each neuron would multiply the storage requirements for each neuron by at least a factor of two, but probably much more. On top of all this, there’s the necessity of mapping all the meaningful neural firing patterns that are decoded from a person’s brain activity, which would require even further computer resources, both for doing the analysis and for storing the patterns and information about their meaning. Even though far less than the full set of 100 billion neurons would ever be of interest in mapping or monitoring for any particular type of pattern, the storage and analysis of a person’s brain activity would still require extraordinary memory and storage capabilities.

To put this into better perspective, in August 2011, IBM was reported to have built the largest storage array ever, with a capacity of 120 petabytes (120 million gigabytes). This would be about enough to store the complete neural information for one human brain for about twenty minutes at most.

So we see that for Akwei’s claims to be true, there has to be a database for each individual target that contains complete data on that person’s recognized patterns, as well as storage capacities for every millisecond of brain activity to be used for real-time monitoring while also analyzing the person’s brain activity. This might easily require days, weeks, or even months worth of recorded data during the preliminary pattern learning phase. Not that this is completely impossible, but it needs to be kept in perspective what Akwei is claiming, and what is realistic.

Akwei makes one more statement in his application that’s of particular interest here. He says (emphasis added):

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.”

This is an important point to take note of, because it supports the fact that the Robert Malech patent is also often cited as proof that these mind-reading technologies exist, yet the fact that this patent is in the public records goes directly against NSA procedures for keeping technological secrets. Why would it be there in the publicly available patent records if it were a classified technology that the government wanted to keep secret? It wouldn't.



The Robert G. Malech Patent

Because many people have been referring to this particular patent as proof that remote mind-reading technologies exist, I decided to search it out at the US Patent Office website, and retrieved a copy of the original application (US patent #3951134). The patent application was made in 1974 and was granted in 1976. The patent application describes the technology as an:

Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject's brain waves. The interference waveform which is representative of the brain wave activity is re-transmitted by the brain to a receiver where it is demodulated and amplified.”

As has already been explained in my previous article, there are a number of problems with this method of remotely reading brainwaves that makes it unrealistic as a real application. However, because it received a patent grant, many people assume that the technology must work.

The use of the word ‘remote’ can be deceiving when used in relation to such technologies, and might mean nothing more than the distance of mere inches, as with SQUIDs in a MEG machine. The Malech patent gives no indication of the distances that the described technology would be expected to work at, but it does state the following (emphasis added):

If the amplitudes of the two signals transmitted to the subject are maintained at identical levels, the resultant interference waveform, absent influences of external radiation, may be expected to assume zero intensity when maximum interference occurs[.]”

This raises the problems that I outlined in my previous article – that any extraneous electromagnetic interference arising between the source and the target will disrupt the signals, and this interference is virtually impossible to eliminate in an open environment. The greater the distance between source and target, the more interference there will be to contend with. This applies to both the transmitted signal and the returned signal, doubling the problem of sending and receiving a reliable signal. But more than that, the above quote also reveals the patent author only assumes that the technology will work as expected, rather than having actually been tested.

Further, in describing the method of operation, the patent application states (emphasis added):

[T]he interference waveform is modulated by the brain waves. It is believed that this is due to the fact that brain waves produce electric charges each of which has a component of electromagnetic radiation associated with it.”

These last two quoted statements clearly indicate that, at least at the time that the application was filed (1974), there was no certainty that this technology would work as described or even that specific brainwave patterns could be determined, which suggests that a prototype of the technology was never actually built and tested to see if it would do what the patent author claims. According to the patent application process in the USA, such requirements are not necessary as long as the technology or invention is conceptually sound and based on known scientific principles.

One more thing needs to be understood that has to do with the patent process. According to an explanation of the patent examination process available on the US Patent Office website (emphasis added):

As a rule the examiner will give to a claim its "broadest reasonable interpretation consistent with the specification. […] [T]he words of the claim must be given their plain (ordinary and customary) meaning unless applicant has provided a clear definition in the specification.”

Given this fact, a closer scrutiny of the Malech patent application will reveal that certain distinctions in its wording – most specifically in the choice of using the words ‘can’, ‘will’, and ‘may’ when and where they have been – suggest that the application author clearly understood that certain key aspects of this technology’s operation were only being assumed to work, rather than being certain to. I will spare the reader from going over these details of the application here, however, and will instead leave it to those who are interested in verifying this for themselves to read the original patent application available at the US Patent Office and carefully note how it is worded to reflect certain assumptions were being made about its capabilities.

One final note about this patent. It was obviously of no interest to the military or intelligence organs of the US government, otherwise it would have been immediately classified and kept out of the patent records. The fact that it received a patent grant relatively quickly and is in the patent records implies that the military/intelligence organs had already researched this technology and found it to be unworkable. That being the case, the Malech patent may have been purposely planted in the public records as a prop for later disinformation campaigns to mislead and confuse the targeted public about the sort of mind-control technologies that are being used on them, while other, more realistic methods of mind-control are applied without any awareness of the target. Even if the Malech patent wasn’t purposely planted, it has nonetheless become a misleading piece of information that has since been frequently used as proof that this remote mind-reading technology exists and can even do everything that John St. Clair Akwei claims.


Tuesday, July 24, 2012

The Phone Trap

by Anthony Forwood


 
Has this happened to you?
 
You start making friends with other TIs on facebook or some other website, and they want you to phone them.
 
Sometimes they'll say that they want to tell you something, but they don't feel safe talking about it online. So they want you to call them by phone so you can hear whatever it is they have to say.
 
I recall that when I first came on facebook, the first person I made friends with was a certain woman about my own age who approached me almost immediately and claimed to be a TI victimized by mind control. She posted a lot of different pictures of herself that were always very alluring and seductive. She was quite a looker. She always talked about how badly her perps were treating her, but never really said exactly what they were doing, or who they were. She said she wanted me to call her so she could tell me about her situation.
 
I don't have a phone, so I had to turn her down. I thought it was kind of strange that she would think that a phone was any more secure against perps than online messages, particularly when she was talking to someone she didn't know anything about, and so I concluded that she was into phone sex or something, and was trying to suggest that to me.
 
But then other people did the same thing. They said they had something important to tell me, and wanted me to call them. Again, I had to turn them down.
 
But I was suspicious. Something didn't seem right.
 
I mostly forgot about these incidents until it happened when I was investigating a few people. The first was a man named Jack Pruett, whose name I had previously seen mentioned in relation to the Montauk Projects (a mind-control program involving children), and then I had come across a newly published book by him at the library. The book (The Grandest Deception) was about the coming New World Order, and the author ended by asking interested readers to contact him if they were interested in joining together with him to devise a long-range plan to fight against it. It was all very intriguing, so I copied down his email address from the book and wrote to him, inquiring about this plan he had. I also asked him point-blank if he was the same Jack Pruett that worked on the Montauk Projects. Interestingly, he replied that he knew about that secret program, but denied being the same person.
 
He also asked me to call him by phone to discuss his plan. I refused, and mentioned that I didn't trust phones because of the ability to be hypnotized through them, and I didn't feel certain that he wasn't the Jack Pruett from Montauk. His responses to my emails had been coming immediately after I sent mine, and when I sent the one saying what I had about my suspicions, instead of getting a response, the computer terminal I was using suddenly went weird on me, and everything I was typing was showing up on the screen backwards, from right to left instead of left to right, the keys stopped working properly, and I couldn't do anything at all but log off. That ended our conversation, and it left me more suspicious than ever. I thought that it was an intimidation tactic and that I had been absolutely correct in pegging him as the same man that was involved in the secret mind-control programs at Montauk (I have since found further evidence to support this).
 
I also started thinking about all these requests to call these people by phone.
 
Just to explain a little background on this phone issue, I had previously researched the little-known story of another man named Jack Sarfatti (a quantum physicist who played a small historical part in consciousness research in the 1970s, whose name I had often come across in a number of books), who, when he was 13 years old back in 1953, had received a series of very strange phone calls from a metallic-sounding computerized voice that had left him in a dazed, hypnotic state after each one. It turns out that Sarfatti had been enrolled in a secret government program for gifted children at about this same time, and this program wasn't unlike the Montauk Projects in certain ways. The story of Sarfatti (described in his online book 'Destiny Matrix 2012', and in my own online book 'Shadow World') is actually what led me to begin all my research into mind-control technologies, and this phone hypnosis issue kept coming up in certain early cases of UFO witnesses and 'alien abductees' (which I've since come to conclude are aspects of early mind-control experiments). These witnesses and abductees were very often describing getting these strange phone calls from metallic-sounding computerized voices just like Sarfatti had received, so I've become quite certain that there's something to these calls and 'phone hypnosis' as part of a standard mind-control process, and still is.
 
To continue... After dealing with Jack Pruett and having him attempt to get me to call him, and the sudden strange activity on the computer when I told him my suspicions, certain other people that I've investigated for their extraordinary claims have also attempted to get me to talk to them by phone, including the self-proclaimed 'super-soldier', Duncan O'Finioan (interviewed on Jesse Ventura's TV show, 'Conspiracy Theory'), and the more familiar TI 'activist' Robert Duncan, who I've more recently been dealing with.
 
So, all these attempts by people who have something to do with gang-stalking or mind-control to talk to them by phone has got me very suspicious about phones being used as part of a hypnosis program to draw people into this sinister web, and I'm tending to believe that there really is something to this. Each of these people have acted very strange in certain ways, and I've decided to keep my distance from them for obvious reasons.
 
One of them, who is here on facebook, was having a very hard time with their gang-stalking not long ago, and then all of a sudden they were saying that everything was fixed and it had all ended, and they wanted me to call them to tell me something very important. I never did, of course. Now, in only a few months, they've gone from being without any money and forced to live on the street to apparently having all sorts of money and traveling around to other countries, living it up and not a problem in the world. Very strange!
 
There are a few other strange instances with others here on facebook as well, each of whom has also wanted me to call them by phone, but to describe these is just too complex to get into at this point, so I'll leave them for now.
 
I'm just curious if anyone else has had any TIs want them to call them by phone, and what might have come of it. I urge everyone to be very careful of this, since you may not even know what such a phone call might have resulted in, if you had made it. You may be being hypnotized and programmed or otherwise manipulated. You won't necessarily know, considering how effective hypnosis can be at covering its own tracks!
 
I must also warn about online videos, since they can be used in a similar manner. Although they don't offer the feedback necessary for in-depth hypnotic programming, they can still be used to put you in a light hypnotic state that will make you suggestive to commands and instructions, whether they be spoken normally or inserted subliminally. These might be used to influence you to take further steps that will lead you into more intense mind control by other means.
 
One final note of explanation... Since 1953 when Sarfatti received those strange calls (the very same year that MKULTRA started, by the way), hypnosis techniques could easily have been computer automated and packaged as a software program that would allow anyone to apply it on others. There are certain audio tones and electromagnetic frequencies that will put a person into a hypnotic state, and subliminal suggestions can then be given to test if the person is hypnotized, and through these means they can be completely and unknowingly mind-controlled. They can be made to believe anything, including alternative suggestions for whatever strange things occur to them or around them. These might include suggestions that will confuse them as to the technologies being used against them.
 
If you are curious about this, please stay up to date with my documents and articles posted here on my blog, as well as at http://www.scribd.com/aforwood, and the facebook group Anti-Gang-Stalking Network. You may also contact me at forwood@live.ca with any questions or concerns you might have.

Sunday, July 22, 2012

Let's Get Real About All This Technology

by Anthony Forwood

Let’s play Devil’s Advocate assume that we are a group of fascists who have the technologies that many people claim to exist. This means we can put voices in people’s heads, read their thoughts, see what they’re seeing, hear what they’re hearing, insert thoughts without them realizing it, make them feel any way we want, act any way we want, etc… All the things that the most prominent promoters of these technologies among the TI community claim they can do. Let’s also assume that we can target anybody at all, since there is apparently no way to guard against these technologies.

Now, if we were going to target anybody at all, what would the objective be?

To piss around with nobodies just for a kick? That would be a complete waste of these very expensive and highly sophisticated technologies and the entertainment value for psychotic minds wouldn’t be worth it.

To police or punish certain individuals? Even if the technologies were used for this purpose, the cost for what these technologies would require in hardware per person makes this very unfeasible compared to other more practical methods. I calculated the computer storage requirements for a full representation of the human brain, and with 100 billion neurons in the human brain having an average firing rate of 1 millisecond per neuron, at one byte per neuron, that equates to 100 billion neurons x 1000 milliseconds = 100 trillion bytes, or 100,000 gigabytes per second of brain activity! So, to use such sophisticated technology for policing and punishing ordinary people is totally impractical. This technology would deserve something much more worthwhile to make it practical.

The best objective in using such highly advanced technology would be to apply it to the ultimate goal of any fascist group: the complete takeover and control of a population to turn it into a totalitarian dictatorship.

So, when seen in this light, who would we target first? Would it be ordinary people like you and me, or would it be more influential people like political, military, and corporate leaders?

If we were interested in bringing about a totalitarian state and we had this incredibly powerful and undetectable technology at our disposal, we’d target highly influential people first, who we could make to think and act in ways that are to our benefit. If we were seeking to turn a nation or the world into a slave population, as most of us believe is the ultimate goal of those developing and using mind-control technologies, then we would focus on accomplishing this in the best and quickest way possible, and not waste time toying with ordinary people who have little influence at all in fulfilling that objective and can offer us next to nothing as our unwitting slaves.

Our political, military, and corporate leaders would certainly be the first targets, and this would be quite easy if we could actually eavesdrop on everything they saw, heard, felt, thought, said, or did, and if we could insert other thoughts, feelings, sounds, and images, or cause them to otherwise act in ways that were more desirable to us, without them even knowing that we were. From all the extraordinary claims that many people are making about these technologies, based on their own supposed experiences as targets of them, the technologies are so sophisticated that these people can’t be sure of anything any more, and can apparently only guess when they are thinking and acting of their own free will at any given time. So, it would be just the same for these leaders, and there would be nothing that could be done about it.

Once our leaders were under control, the next targets would be the people directly under them, and the targeting would continue to expand downwards through the levels of power and authority until ALL levels were contained and controlled. Working from the top down would be the most efficient and least problematic method of applying these technologies to take over an entire population, and NOT bottom up, starting with ordinary people like you and me.

As this was going on, certain acts in business and politics would begin to quickly unfold that would move us towards the preferred state that those who possess the technologies want. There would be no reason to dally and wait for the right situations, since, as we know from 9/11, such situations can be created to advance certain draconian measures that move us in the direction that these fascists want. But with these technologies being at the level of sophistication that so many people claim they are, such measures could be taken to a far greater extent far more quickly and with far more desirable results than 9/11 produced.

If these technologies actually existed in the manner that many claim they do and for as long as they supposedly have (at least twenty years), then we would already be living in a totalitarian dictatorship, and there would no longer be any reason for those who possess them to worry about pretending otherwise. We would already see this quite clearly and it would be common knowledge that this was the state we were in. Society would have quickly become far different than it was before, and it would be nothing at all like it is now. The very first thing that would be done would be that all constitutional rights would be immediately and publicly revoked, something on the order of Martial Law would be declared, and police and military would be on the streets day and night in full combat readiness, prepared to squelch any public revolt. People would be being shot on site for protesting in any way whatsoever, just to get the message across. It would be quick and to the point.

Just to understand such a situation better, the idea of revolting against this sudden change needs to be considered. Any attempts to revolt would require the ability for people to first plan and organize, and this would require them to be able to communicate with each other in a secure and expedient fashion. But since all of our communications systems are already closely monitored by ECHELON (or could otherwise be taken down quite easily), there would be no way to plan and organize without being immediately discovered. Even to set up a new means of communication, even if it were simply a code system used over the existing communications network, or even messengers on horses, or whatever else, that system would have to already be in place and each party involved fully understanding how to use it, otherwise the same communication problem would still exist. And this neglects the possibility of sabotage by infiltrators.

How many people would it take to police the remaining population? With the technology at the level of advancement that so many people claim they are at, it wouldn’t require very many people at all. People would suddenly be quite expendable, and as the population came to realize that they weren’t of any great value to the new power structure beyond slave labor, people would begin to volunteer themselves to that new power structure, just to save their own lives. So the population would start policing itself rather quickly and voluntarily, and those who refused to conform or had any dissenting thoughts would be quickly weeded out and unceremoniously exterminated. This would serve those who possess the technology by eliminating the greatest opposition and preserving only those who would be most conforming to the new power structure, as quickly as possible. With the technology that many people claim exists, and to the degree that they say it does, the remainder of the population would be brought into the mind-control system without a fight.

So why isn’t this happening?

The answer is very clear. It’s because these technologies DO NOT EXIST to the level that many people claim they do! They can’t read your thoughts, see what you’re seeing, hear what you’re hearing, insert thoughts without you knowing, and they are not mapping the brainwave signatures of an entire population so as to control each of us through these means. It’s not only impractical as far as resources go, it’s also completely inefficient to target ordinary people.

These technologies, with full Remote Neural Monitoring as described here, were claimed to exist as long ago as 1992, in the case of John St. Clair Akwei. That was twenty years ago. Twenty years is a long time for things to progress, and yet, what have we seen that would indicate that these technologies actually exist? All we have to show for it is a lot of very ordinary and unremarkable people who claim to be targeted by them, but from my personal experience, none of these people can even be bothered to back their claims with any sort of intelligent consideration of their own experiences or of the claims they make, nor do they seem to have done any serious research, as anyone who was truly being targeted would want to do.

It’s been coming to my awareness more and more that many of these people who claim that they’re being targeted by such extraordinary technologies are the sort of people who tend to think that whatever might occur around them that they don’t like or are even the slightest bit suspicious of, that it must be due to being targeted. These people see any perceived negative situations as always being somebody else’s fault, and they see these situations as somebody else’s responsibility to deal with, while they claim complete incapacity to do so themselves.

At the very worst, these people have been conditioned to not think at all, but this is due to their own failures and laziness, preferring to spend the majority of their lives entertaining their minds with TV, fictional books and movies, and Internet gossip. The real extent of the mind-control that DOES exist has been effective in dumbing down a large section of the population so that they don’t know how to think, and require – even DEMAND – being babysat by those in power.

These technologies are obviously not even needed for these people. Just pose the idea that they exist, and they crumble in utter paranoia and submissiveness. These people are the REAL threat to society more than anything else, because as their numbers grow and they speak such nonsense more and more, the rest of us begin to look just as foolish as our more rational voices are drowned out, and this only makes it more apparent to those in power that we ALL need to be babysat and are undeserving of the rights and freedoms that we still have.

Freedom of speech comes with certain responsibilities. These people need to be responsible for what they claim.

Tuesday, July 10, 2012

Detecting Disinformation Agents

by Anthony Forwood



There are several types of disinformation agents, from high-profile ones who gain a lot of publicity and promote well-crafted stories, to low-level ones who serve to flood the Internet with less reputable claims. This document deals primarily with the former.

A disinformation agent will sometimes be someone who works directly for a larger entity (usually the government or major corporation) and uses a cover identity, but more often than not they will be someone who receives false information from someone who purports to be ‘in the know’, such as a government whistleblower. In other instances, they might just be someone who makes certain claims that tend to benefit those who keep dark secrets because it creates a sense of doubtfulness about those secrets, and confuses any chance of learning the truth. Whatever the case, they will be used because they’re willing to believe the information they’re given, and they’ll usually have or be provided with the right avenues and receive a greater than usual amount of promotion to ‘get the word out’. Often, they’ll be able to provide physical documents or other evidence that reveal certain truths to their story, but even these will not reveal the veracity of their entire story (nor are they necessarily legitimate). Other times, they’ll be able to provide verbal information that on later investigation by others will pan out, thus offering some legitimacy to what they claim. However, there will ALWAYS be unverifiable information that will be part of the foundation of their claims, and this information will more often than not be extraordinary in nature (e.g. beyond known science).

A disinformation agent will usually be given a scripted story to disseminate. This story will weave many truths with many falsehoods, so that these truths might be disregarded due to the inclusion of the falsehoods. Very often, these truths will simply be disregarded because they’re so far outside of our common understanding that they sound too outrageous to easily accept, and are hard – if not impossible – to prove. In such a case, the added falsehoods are meant to add to the seeming illegitimacy of the truths. This helps to turn away all but the most gullible people, who will be used to further increase the seeming absurdity of these planted falsehoods by the unscientific mindset these people generally have and the propensity to be carried away by imaginative ideas rather than to stay grounded in just those known truths that are provable.

A disinformation agent, particularly one who knows that they are disseminating false information, will rarely expand on their original information, and will be more interested in disseminating just the information they’ve been provided with. An unwitting disinformation agent, on the other hand, will usually be interested in investigating their own information further, and not be as compelled to stick to their original story over time as new revelations crop up.

It’s common for there to be a number of disinformation agents working simultaneously, either in secret collaboration or alone and unaware of each other’s true identity. One of their tactics is to engage in creating controversy between themselves, which only serves to disrupt the situation further and increase the uncertainty, while keeping their followers hoping something revealing might come of it.

Disinformation agents, whether witting or unwitting, will usually believe the story they tell, and this is a standard procedure in keeping secrets. These are cover stories that are fed to them with the purpose of compartmentalizing the knowledge and activities of the secret programs that they might actually be privy to. Virtually no one but those few people at the very top will ever know the full truth about the secret program.

The ultimate purpose of a disinformation agent is three-fold:

a) to create a sense of ridicule about anything that they include in their story so that even what is true will be not be believed by intelligent people,

b) to mislead those who are gullible enough to believe their story, and

c) to divert the efforts of those who seek to know the truth through further investigation.

Although disinformation agents are used to cover up the truth, their claims should not be written off completely, since they can still teach us something about the underlying truth that they’re meant to cover up.

To measure the level of truth within each of these individual stories, the unverifiable claims must be sorted out and then weighed against the verifiable claims. These two aspects of any person’s claims must be clearly understood before considering any further what they’re claiming.

To measure the claims that are being made by someone, it’s necessary to always pay attention to what they say and how they present it. For instance:

1) What percentage of their claims can be checked out, compared to what can’t?

2) What seems to be their motive for making their claims?

3) Do they act fairly and honestly during a discussion?

4) Do they act like they are beyond questioning?

5) Are they willing to provide further evidence of their claims when it’s asked for?

6) Do they claim to have special inside sources that gives them an edge on the facts?

7) Do they claim early on to only be interested in exposing what is going on at whatever cost, but then later blatantly withhold information?

8) Do they ever offer valid sources of information that would support some of what they say?

9) Do they admit when they’re only assuming something or speculating, or do they pass off everything they say as hard fact?

10) Do they often leave it for you to fill in what they aren’t saying, relying on you to use your imagination to make the connections between certain things?

11) How much trust do they expect you to put into what they say?

12) Do they attempt use emotional appeals to gain support for their claims, or do they stick to straight, unemotionally imbued information?

13) Do they convey a lot of fear by the way they describe things?

14) Do they spend an excessive amount of time going over less significant or more widely known information than they do going over the more significant aspects of their claims, or in discussing any new information they might claim to have?

14) Can they explain what they claim in a logical and scientific way that might offer the ability to test, or do they avoid those important aspects and rely instead on emotional appeal for persuasion?

15) Is the way they present themselves that of an honest, fair, and respectful person that can admit being wrong, or are there telltale quarks in their personality that might indicate otherwise?

16) Do they include terminology or phrases that are unusual, and can’t be found anywhere else where the same meaning applies? (I see this with almost every person I’ve come across that I’ve suspected of being a high-profile disinformation agent, and I have a suspicion that this terminology is purposely planted in order to track the spread of the disinformation from its original source, and to indicate what pieces of disinformation are being bought into and what aren’t. You can usually determine whether the phrases are legitimate or just made up by doing an Internet search for them, to see who else uses them.)

* * *

Here are some further pointers I found online (from ‘Disinformation Tactics of Shills & Online Trolls/Zombies’). These are common traits of low-level disinformation agents, although they usually fit high-profile ones as well:

1) Avoidance - They never actually discuss issues head-on or provide constructive input, generally avoiding citation of references or credentials. Rather, they merely imply this, that, and the other. Virtually everything about their presentation implies their authority and expert knowledge in the matter without any further justification for credibility.

2) Selectivity – They tend to pick and choose opponents carefully, either applying the hit-and-run approach against mere commentators supportive of opponents, or focusing heavier attacks on key opponents who are known to directly address issues. Should a commentator become argumentative with any success, the focus will shift to include the commentator as well.

3) Coincidental Participation – They tend to surface suddenly and somewhat coincidentally with a new controversial topic with no clear prior record of participation in general discussions in the particular public arena involved. They likewise tend to vanish once the topic is no longer of general concern. They were likely directed or elected to be there for a reason, and vanish with no reason.

4) Teamwork – They tend to operate in self-congratulatory and complementary packs or teams. Of course, this can happen naturally in any public forum, but there will likely be an ongoing pattern of frequent exchanges of this sort where professionals are involved. Sometimes one of the players will infiltrate the opponent camp to become a source for straw man or other tactics designed to dilute opponent presentation strength.

5) Anti-conspiratorial – They almost always have disdain for 'conspiracy theorists' and, usually, for those who in any way believe JFK was not killed by LHO. Ask yourself why, if they hold such disdain for conspiracy theorists, do they focus on defending a single topic discussed in a newsgroup focusing on conspiracies? One might think they would either be trying to make fools of everyone on every topic, or simply ignore the group they hold in such disdain. Or, one might more rightly conclude they have an ulterior motive for their actions in going out of their way to focus as they do.

6) Artificial Emotions – An odd kind of 'artificial' emotionalism and an unusually thick skin -- an ability to persevere and persist even in the face of overwhelming criticism and unacceptance. This likely stems from intelligence community training that, no matter how condemning the evidence, deny everything, and never become emotionally involved or reactive. The net result for a disinfo artist is that emotions can seem artificial. Most people, if responding in anger, for instance, will express their animosity throughout their rebuttal. But disinfo types usually have trouble maintaining the 'image' and are hot and cold with respect to pretended emotions and their usually more calm or unemotional communications style. It's just a job, and they often seem unable to 'act their role in character' as well in a communications medium as they might be able in a real face-to-face conversation/confrontation. You might have outright rage and indignation one moment, ho-hum the next, and more anger later -- an emotional yo-yo. With respect to being thick-skinned, no amount of criticism will deter them from doing their job, and they will generally continue their old disinfo patterns without any adjustments to criticisms of how obvious it is that they play that game -- where a more rational individual who truly cares what others think might seek to improve their communications style, substance, and so forth, or simply give up.

7) Inconsistent – There is also a tendency to make mistakes which betray their true self/motives. This may stem from not really knowing their topic, or it may be somewhat 'Freudian', so to speak, in that perhaps they really root for the side of truth deep within.

Often, they will simply cite contradictory information which neutralizes itself and the author. For instance, one such player claimed to be a Navy pilot, but blamed his poor communicating skills (spelling, grammar, incoherent style) on having only a grade-school education. I'm not aware of too many Navy pilots who don't have a college degree. Another claimed no knowledge of a particular topic/situation but later claimed first-hand knowledge of it.

8 ) Time Constant – There are three ways this can be seen to work, especially when the government or other empowered player is involved in a cover up operation:

a) ANY newsgroup posting by a targeted proponent for truth can result in an IMMEDIATE response. The government and other empowered players can afford to pay people to sit there and watch for an opportunity to do some damage. SINCE DISINFO IN A NEWSGROUP ONLY WORKS IF THE READER SEES IT - FAST RESPONSE IS CALLED FOR, or the visitor may be swayed towards truth.

b) When dealing in more direct ways with a disinformationalist, such as email, DELAY IS CALLED FOR - there will usually be a minimum of a 48-72 hour delay. This allows a sit-down team discussion on response strategy for best effect, and even enough time to 'get permission' or instruction from a formal chain of command.

c) In the newsgroup example a) above, it will often ALSO be seen that bigger guns are drawn and fired after the same 48-72 hours delay - the team approach in play. This is especially true when the targeted truth seeker or their comments are considered more important with respect to potential to reveal truth. Thus, a serious truth sayer will be attacked twice for the same sin.

* * *

Further Notes

The purpose of disinformation is to confuse the facts about an issue as much as possible and leave so many false leads and possibilities that discovery of the truth becomes next to impossible to surmise. By the time any significant facts that would point to the truth can ever be ascertained, the greater part of what remains to be known will still be much greater, so that uncovering a few facts will make little difference. The best that this might lead to is that some people might realize what is true and what is false, but trying to convince anyone who’s willing to believe the disinformation is futile, because the disinformation is designed to draw in the type of person who negates logical reasoning and allows their emotions and imaginations to lead them in making decisions instead. On the other hand, anyone else you might try to convince will want either irrefutable objective proof, or at the very least, the acknowledgement of a trusted authority whom the greater public will believe in.

Disinformation campaigns build on or borrow from each other to keep the most successful falsehoods alive and use these in whatever way they can be to create new disinformation campaigns. Therefore, we see that the UFO/ET issue, which started one of the biggest disinformation campaigns that continues today, has been built on and borrowed from to incorporate other controversial issues, including psychism, time-travel, ancient astronaut theories, spirituality, metaphysics, demonology, mind-control, the NWO, and secret government technologies. If they want to cover up something, they create a disinformation campaign that relies on the more popularly accepted falsehoods of previous campaigns, and the more outrageous they happen to be, the better.

The underlying purpose of disinformation is to create confusion and distraction and thereby bury the light of truth deep beneath a pile of falsehoods, so it only helps the disinformers to put out as many claims as possible by as many people as possible. But in order to keep the truth hidden over a long time, the disinformation campaigns must also continue in one form or other, and this usually means finding new people with new stories to act as disseminators as old ones are ‘put out to pasture’ and dissolve into obscurity. These new recruits will lead the older campaign to new focal points of misdirection, such as we’ve seen happen with the initial UFO/ET issue leading to all sorts of rather extraordinary claims about certain aspects of witness contacts, sightings, and abductions. The underlying reason for building on this earlier disinformation campaign is because it worked so well, and continues to work well, in covering up a far more plausible but equally sinister truth.