Wednesday, May 14, 2014

The Network: A Look Inside the Targeting System

PLEASE NOTE:

THE POWERS THAT BE DO NOT WANT THIS INFORMATION OUT THERE. THEY HAVE BEEN TRYING TO BLOCK IT FROM SEARCH ENGINES AND WILL NOT ALLOW ME TO SHARE IT.

PLEASE SHARE WIDELY!!!

* * * * *

By Anthony Forwood


UPDATED – April 15, 2013

NOTE: This is a SPECULATIVE look at the possible structure and organization of the secret network that I believe lies behind organized gang-stalking and mind control. What I describe here is based on my own research, observations, and personal experiences. How I depict the gang-stalking network within this document may not precisely reflect the way it’s actually structured or how it operates, but it seems to be pretty close to how things really are. Whatever the case, the structure and operational methods described here are completely workable in all respects and the security measures used would be quite effective in keeping the network and its activities under a very tight blanket of secrecy. This document complements Social Self-Destruction: A Secret War of Controlled Chaos, which can be found at the link provided at the end of this document. It is highly recommended that you read that article first.

The following information can still be greatly extended and improved on, and probably will be at some point, so please check for the latest version, always available at:


Anthony Forwood

August 18, 2012



"The great strength of our Order lies in its concealment, let it never appear, in any place in its own name, but always covered by another name, and another occupation.” - Adam Weishaupt, founder of The Grand Lodge of the Illuminati

Creation of the Network and its Membership


What I describe here I will call ‘The Network’, but this is only for the purpose of giving a name to something that doesn’t necessarily have one nor otherwise have a requirement for one, at least for the public at large, because there is very little chance that it will ever be talked about by anyone who can be certain of its existence.[1]

The Network is made up of many isolated individuals and groups throughout the US, Canada, and in many other countries around the world. The term ‘group’ can be defined here as any group of people at all who hold a common bond of unity, and might be of any type or size, from small social groups of just a few people to entire workforces of large corporations, memberships of international organizations, and governments. But it even goes beyond just this, since it appears that just about any method that might be used to draw people in will likely be applied.

Most large corporate workforces and many smaller ones have already been brought wholesale into this Network through ‘Occupational Health and Safety’ laws that require employees and employers to report anything in the workplace that might be considered suspicious or threatening activity. Anyone who is reported on is assessed (without their knowledge) to determine if they should be put on a ‘watch list’. Watch lists are a key aspect of the Network’s operations, and will be discussed further on.

Similar ‘Community Health and Safety’ laws have also been established in many countries so that these reporting systems also extend into school environments, church congregations, social groups, neighborhoods and public streets, and even private homes.[2]

A special reporting system has also been set up to accommodate these laws and manage everything, and various types of recruitment programs are routinely conducted within workplaces, community groups, and elsewhere, to enlist ‘citizen agents’ and to promote the security advantages that Network members receive. This includes receiving instant notifications by phone whenever a dangerous person is in their area.[1] This notification service is only available to members who have signed a secrecy oath or non-disclosure agreement. This is explained more fully in a later section.

The Network connects all of its members to a central command system that is very sophisticated and highly automated, and is able to handle virtually all of the work involved in normal Network operations. This includes managing members, handling communications, information gathering, planning operations, performing logistics, directing operations, tracking both members and targets, profiling, etc. Very few human resources are needed to manage this system, and direct contact between management levels and operational levels is very minimal. Except during recruitment, all contact is conducted through a highly secure Network communications system.

Soon after these health and safety laws were enacted and the reporting system was set up, a significant number of people were quickly recruited into this Network and have since been under strict secrecy oaths. People are being recruited all the time, and the Network is constantly growing. As new members, they are joining a secret force of eyes and ears in the workplace and community, assigned to report on any suspicious or threatening activity through this system, and to monitor someone who has been put on a watch list. These targeted individuals are constantly tracked, and members receive cell phone text notifications whenever they are in their area, and they are expected to assist in monitoring and ‘policing’ these people under the pretext of maintaining the safety of the community. If a member is a good candidate for deeper involvement, various different opportunities to take part in ‘special operations’ can be offered. These opportunities are only made available to members who match a certain profile and have been cleared for these activities.

Certain individuals and groups that lie outside mainstream society – street gangs, biker clubs, prostitutes, criminals, drug addicts, homeless people, alternative groups, illegal immigrants – are also brought into the Network through other means than those described above. Any person or group is a candidate for being recruited into this Network, and there are various different classifications of membership for different types of candidates, which is determined through careful profile matching.

The many individuals and groups that make up the Network’s vast and varied membership are kept as isolated as possible from other members and completely unaware of the full extent of the Network, and they don’t know about or even expect that many of the other individuals and groups are involved, and identities between members are kept as anonymous as possible. However, some groups of members will necessarily be aware of each other’s involvement to some capacity, but these groups remain otherwise just as anonymous and isolated within the Network.

As well as them not being aware of the full extent of the Network and who other members might be, none of the members ever know anything more about what they are involved in beyond what they are informed of through the Network. All information circulated through the Network is carefully controlled, and cover stories can be given for the activities that members engage in, as well as the pretexts for doing so. Covert monitoring of every member’s communications assures early warning of possible security breaches.

Besides the normal operations involving monitoring and policing targeted individuals, certain individuals and groups are also put to use in various ‘special projects’ that have to do with deeper levels of the Network, and usually involve the exploitation of targeted individuals in some way.

Many groups and many individuals have been absorbed into the Network one after the other for many years, until now virtually any given group that exists could have a significant number of Network members within it, acting through that group or as part of another. Since its inception (as early as the 1980s), this secret Network has expanded beyond corporate workforces, community groups, and various other organizations that were brought into it early on. It has come to include street gangs, biker clubs, immigrants, homeless people, tourists, and even children. There is no person or group that the Network doesn’t have a use for.

The Network is open-ended, so that it’s capable of unlimited expansion and can encompass any number of individuals and groups into itself for any number of purposes. It is intended that eventually every person on the planet will be included within its database, either as a member or as a targeted individual, and will be under constant watch and direction.

The Network is ideally suited for incorporating a variety of new functionalities into its structure, not the least of which are mind-control technologies (discussed further on). The central computer system runs specially designed artificial intelligence software that gives it the ability to learn and evolve new functionalities that can be incorporated into normal operations or special projects.

The Network is connected into every communication system, information network, and database on the planet, and incorporates these into its data collection procedures. It also takes full advantage of ECHELON, the NSA’s global surveillance system. Virtually any information that exists in digital form can be accessed by the Network system for real-time surveillance and intelligence gathering purposes. The monitoring of communications also includes the ability to interfere. This means that information flow can be controlled by various covert ‘denial of access’ techniques, and on a person-by-person basis.

Full-time GPS links to members and targets through their cell phones are used by the Network system for tracking and logistics purposes. Covert use of RFID chips make it possible to track anyone who doesn’t own or carry a cell phone.

With these and other connected resources, the Network’s command center can constantly gather, analyze, and update an extensive amount of information on any person, as well as instantly locate and track them in real-time. The Network incorporates advanced profiling systems into many of its automated processes, such as for selecting, evaluating, and managing members when recruiting, planning operations, assigning operational tasks, etc.

As a policing system, the Network maintains a separate database for individuals who have been flagged as targets for monitoring and policing, which will be carried out by Network members through various assigned operational tasks. Targets are determined through the reporting system described earlier, which involves receiving threat or suspicion reports from members, assessing these reports and the individuals involved, and determining whether they should be placed on a watch list. To do this, extensive information is gathered on a reported individual and analyzed, and if they match certain qualifications then specific operational procedures are determined for handling them. Once an individual is placed on a list, the target is constantly tracked by the Network system and monitoring tasks will immediately be assigned to members within the target’s neighborhood or workplace, or wherever else they might go. Manual monitoring by members will include regular reporting to the Network command center.

System Compartmentalization


Because the Network is officially non-existent and must always appear that way in order to maintain its security and achieve its ultimate ends, it is important to those who manage it that knowledge of it is minimized as much as possible by keeping meticulous records of what information each member is privy to or might be aware of, as well as what cover stories they have been given regarding their involvement in any operations. This minimization of awareness means that members should be kept from knowing how extensive the Network and its capabilities are, the details of membership activities, and the identity of other members. The Network is therefore kept highly compartmentalized into isolated individuals and groups that work anonymously to each other but are coordinated through the Network’s command center so that their individual activities can be perfectly integrated into precisely timed and tightly controlled operations, such as in street theatre activities.

This strict compartmentalization of members to restrict their knowledge about the Network and other members not only assures the security of the system and its operations, but also assures that upper management levels can avoid direct responsibility, should anything go wrong. Network compartmentalization also allows members to unknowingly become targets, as well as for members and member groups to be unknowingly pitted against each other to achieve certain desired results, without them ever realizing that they’re being manipulated. Compartmentalization assures that a member who might become a target at some point doesn’t jeopardize other members or lead to revealing any sensitive information about the Network or its operations that they might be privy to. Therefore, the identity of members and groups and all details regarding their participation in operations is kept as confidential as possible and cover stories are implemented as pretexts for assigned tasks whenever possible to facilitate these ends. It’s equally desirable to keep members as anonymous to each other as possible, and although this isn’t always possible, such as when dealing with groups where the members already know each other’s identities as members, the identity of members will otherwise be secured from other members and member groups as much as possible.

Network Operations


Members who are recruited into the Network are initially used within operational assignments by being given certain specific tasks to complete. Operational assignments are carried out by any number of members who are usually unaware of the identity of the other members involved in the same operation, unless they’re operating from within the same member group. When an operational directive is entered into the central command computer by management, the computer system collects all the relevant data it needs and does an analysis of the situation, works out a plan of action, breaks it down into individual tasks, organizes members, and coordinates the execution of the operation. All communications during the execution of an operation will be conducted strictly through the use of cell phone text messages, and will pass through the secured Network system.

There are both ‘official’ and ‘unofficial’ operations. An ‘official’ operation will strictly involve acting as a ‘citizen agent’ to monitor a workplace or community for suspicious or threatening activity, or to police targeted individuals who have been placed on a watch list. All members are expected to take part in these sorts of operations.


An ‘unofficial’ operation goes beyond these activities, and includes any activities that members might engage in of their own free will that are approved activities, or which they have otherwise been given clearance for. Members aren’t usually directly informed about these approved activities, but are left to learn about them on their own, or covertly influenced to engage in them, if and when they reach the deeper levels of the Network. This is to remove any direct responsibility from upper level management while allowing them to take place in a controlled manner. Certain ‘unofficial’ operations will include activities that are covertly influenced through the manipulation of a member or group in order to cause them to believe that they are acting of their own free will in carrying out tasks that result in fulfilling a certain operational directive. These types of ‘unofficial’ operations always involve the testing or application of mind-control technologies.

Recruitment Procedures


New members are continually being recruited into this Network so that it has continually been expanding as it has drawn in more and more of the general population over the years and recruited them into membership. These new recruits are carefully screened for selection using profiling systems to determine various qualifications, such as for classification into different membership levels, and for assigning operational tasks.

Upon approval for membership, each recruit is made to sign a lifetime secrecy oath or non-disclosure agreement in order to legally bind them to a lifetime contract of cooperation and commitment. Once signed, they will be forbidden to ever talk about the Network or their involvement, and must pretend complete ignorance of its existence to others. All members will thereafter be unknowingly under constant electronic surveillance to track and monitor them for security reasons, as well as to accumulate data that can be used for determining management procedures for them and usability in operations. This information will also be used to control a member in the case that they become a security risk or step out of line.

Penalties that include lengthy jail terms for breaches of secrecy oaths or violation of non-disclosure agreements are only the first deterrent against exposure of the Network. Further deterrents are also available, many of them involving blackmail, as well as mind-control technologies that are incorporated into the system. However, the greatest deterrent for any member will be the threat of being rejected from the system once they have been accepted into it and come to understand what might happen to them if they are.

Although most knowledge about the Network and its operations and activities can be easily controlled and contained in the event of any unforeseen situation, it is still sometimes necessary that a balance be maintained between what a particular member might know about the Network and how much control can be maintained over that member, and this can leave the Network vulnerable if care isn’t taken so that maximum control is always maintained. The more controllable a member is, the easier it will be to assure that problems don’t arise that might jeopardize the Network, and the more likely they can be brought into its deeper levels. Tight control of members also allows for greater flexibility in Network operations and activities, allowing it to expand as new application possibilities arise. Therefore, a variety of control mechanisms can be incorporated into the system, ranging from very crude to highly sophisticated.

One method of gaining the membership of a candidate into the Network is to give exaggerated praise for whatever traits or skills that candidate has that they might pride themselves in, and to lead them into believing that those traits or skills are highly sought and will allow the candidate to receive special advantages and have doors opened for them through their dedicated service to the Network. This might be any sort of trait or skill at all, as long as it can be made use of within Network operations or activities. This includes both legitimate as well as criminal traits and skills. The police, acting as a major member group within the Network, take advantage of those criminal elements that they come into contact with during their official duties, and routinely recruit them by first building the recruit’s confidence in their criminal abilities, and leading them into believing that they would benefit by helping the police with the use of these skills. Criminals are highly sought for certain illegal tasks that the police want performed which they and other members will not dare to engage in themselves.


Blackmail Insurance


Although a crude form of control, blackmail is still highly effective and completely within the repertoire of methods used to recruit, control, and silence members. As such, blackmail situations are put to good use and are standard practice within certain groups that are part of the Network. Normally, it will be used where secrecy oaths or non-disclosure agreements aren’t as practical or effective, such as will be the case with criminal groups who aren’t necessarily intimidated by the legal ramifications of legally binding security oaths.

Blackmail can therefore be used as a substitute to secrecy oaths and non-disclosure agreements during recruitment into the Network, but should always be perceived by recruited members as part of an initiation into a group and not as part of the Network. The blackmail procedure will serve to bind a new member to an oath of silence and commitment to that group, and must be as effective as a secrecy oath or non-disclosure agreement would be. It will normally consist of recording the new member engaging in a suitably compromising act, with the recording being secured as insurance against any breaches that could jeopardize the Network and its operations.

There are two basic types of blackmail that are used: sexual and criminal. The most widely used blackmail is sexual blackmail that can be used to destroy a member’s character, social status, and reputation. When more effective blackmail is necessary, it will involve criminal acts that can go so far as to involve murder.

Since blackmail is a criminal act and the upper management levels of the Network seek to distance themselves from all responsibility for activities that its members engage in, these blackmail operations are executed in such a way that responsibility for them or anything at all that might go wrong will fall on individual members or member groups in order to maintain the security and functioning of the Network. This will necessitate providing a certain degree of autonomy of the groups that perform the blackmail procedures, and includes a certain amount of freedom in the decision-making abilities that certain members of these groups have (or at least the perception of such freedom and autonomy) that don’t require prior authorization by upper management levels of the Network. Only members who have been properly programmed and trained for special tasks are ever given clearance for such decision-making abilities, and only as far as specific tasks and activities require.

Recruitment or initiation that involves collecting blackmail insurance must always be done under the guise of a member group, and in such a way that the recruit doesn’t know that the group is part of a larger network. Only after collecting blackmail insurance and establishing oaths of silence and commitment might the new member be brought further into the Network itself. In this sort of situation, the recruit might think that he or she is being initiated into a club, secret society, cult, etc., and will undergo an initiation process that will usually involve the recruit voluntarily putting him or herself into a suitably compromising situation that is recorded and secured as blackmail insurance. In these cases, the recruit will see it as a proof of loyalty to the group they are involved with, and will be led to believe that only that group knows about the compromising act they engaged in.

Sometimes, a recruit might need to be put into a blackmail situation involuntarily, in order to garner their full cooperation when a voluntary blackmail situation isn’t possible. Whatever the case, the blackmail procedure should guarantee that the recruit will want to remain loyal to the Network (through the group) and never speak about their knowledge of it or its activities. The most important thing when collecting blackmail insurance is that it should always be seen to be tied to the member group, and not perceived as anything to do with the larger Network.

Blackmail is only used with certain types of members within certain types of member groups. As mentioned earlier, there are both voluntary and involuntary blackmail situations. A voluntary situation is where a staged act that compromises the member is previously agreed on between the new recruit and other group members, usually as part of their initiation into the group and for binding their loyalty to that group through a secrecy oath.

An involuntary blackmail situation is less straightforward in how it might be carried out, and this will usually depend on whether any compromising material can be discovered about the recruit, or can otherwise be created. This will involve assessing the recruit’s main weaknesses and then creating staged situations to tempt those weaknesses, leading the recruit unsuspectingly into the compromising act. In either case, the compromising act is recorded on tape, and if the blackmail is involuntary, then the recording will be presented to the recruit and it will be made clear that it will be used against them if they should ever disclose anything about the group or its activities. Involuntary blackmail is more commonly applied to recruits who are not part of any group tied to the Network.

Although blackmail offers the obvious ability to force a person to act against their will and do the blackmailer’s bidding, the Network is designed so that blackmail can be used to make them act willingly, without conscience or remorse. The Network selectively and gradually introduces certain members to a completely different form of life than normal, in which their exposure to this new lifestyle is carefully controlled and their perceptions molded so that they begin to be conditioned to accept a new set of attitudes and behaviors that they come to live by. Blackmail operates through the level of guilt or fear that can be associated with it. In other words, the more guilt a person feels towards a compromising act that they have been involved in and the fear of being found out, the more effectively it can be used to control them. The easier it is to control them, the easier it is to lead them into further compromising acts to increase the guilt and strengthen the effectiveness of the blackmail insurance. A member under the pressure of blackmail seeks any means to alleviate their feelings of guilt, including the use of scapegoats, and these are provided through the Network in the form of targets. As a member progresses into the deeper levels of the Network, their perceptions slowly change and they are influenced to see targets as more guilty than they are, and this can serve to alleviate their own guilt in acting out against those targets.

Using blackmail insurance to secure a member’s silence and continuing cooperation and participation in Network activities also provides a means to lead these members into certain deeper levels of the Network’s structure, where certain types of special privileges or rewards can be made available if they take part in certain Network activities that lie outside of ‘official’ operations. These other activities, referred to earlier as ‘special projects’, are designed to keep members engaged in Network activities, while also serving to strengthen their loyalty and oath of silence. Unless a member is receiving adequate mind-control programming to make it unnecessary, suitable blackmail insurance is absolutely required before a member can be cleared to participate in any of the activities that take place at the deeper levels of the Network.

How They Test the Code of Silence


It’s a matter of routine for those who keep secrets in taking steps to assure that those people who are party to those secrets are trustable. There is a standard method that is used for assuring and testing such trustworthiness. Within all groups that are part of the Network, members will be required to immediately report any inappropriate activity that they witness other group members engaging in. This will include saying anything about the Network or its activities. The members will also be made aware that their trust will be tested from time to time, in that a staged security breach or breaking of the rules will be conducted that they will witness, usually by someone they are known to be friends with or who is their superior within the group, and their reaction to this staged breach will be used to determine their trust. The member will never know whether a breach is a test or not, and will therefore be forced to report them, or face the possible consequences for not doing so. Since this is a secret government program involving non-disclosure agreements and secrecy laws, as well as blackmail, the member who doesn’t report a breach will be facing potential criminal repercussions, or equivalent damage to their life (including targeting), for failing to comply. The method described here is very effective for testing a member’s loyalty and trust, either towards another member, a member group, or the Network itself.

This method of testing and maintaining the code of silence will also assure that information regarding a target is safe to disseminate among Network members, and the content of that information could therefore be quite extensive. This means that this information does not have to be accurate, as long as each member who receives it believes that it is and can never discover otherwise.


The Network’s Underground Society


An underground society exists deep within the Network, unknown of by many of its members, and certainly not by anyone who isn’t a member. Access to this underground society and its activities is only given to those members who have been properly initiated into it. Even among those members who have access to it, most of them will only have access to limited parts of it, and only if they meet strict security protocols and have been cleared to take part. These protocols absolutely require that blackmail insurance is first collected, or that adequate mind-control procedures are applied that will guarantee the member’s cooperative involvement. Although blackmail insurance has traditionally been collected when recruiting members into this underground, it’s being phased out as more sophisticated methods of electronic mind-control are being more widely incorporated into the system.

On first exposure, this underground might be seen by its newly introduced members as nothing more than activities that lie outside the Network itself, either as part of the member group they belong to, or by invitation from other members who they don’t know are members and who have been specifically tasked to invite them to participate. Only through progressive exposure to and involvement in certain activities does a member learn anything about the underground, and all of this is carefully controlled at every step.

Many of the people who are brought into the Network are severely lacking in any morals when they’re recruited, and are therefore easy to involve in the deeper levels of this Network underground, and quickly gravitate to taking part in it. These particular members are usually connected to the Network through fringe groups, such as street gangs, motorcycle clubs, drug or prostitution rings, police informants, etc., but not necessarily. Many members who end up in the deepest levels of the underground are just as likely to be business professionals, police officers, teachers, and church leaders.

The easiest members to draw into the Network’s underground, however, are young adults, and sex is the most popular enticement.

Sex is a major weakness for a lot of people, and it’s routinely used within the Network as a means for collecting blackmail insurance, but also for pleasure and entertainment, which is made available to members of the underground through various special projects.

Sex can be used to draw in new recruits, and special groups have been set up within the Network that operate as sex rings and are regularly used for recruitment purposes, usually assisting in collecting blackmail insurance, but also to provide ‘rewards’ or entertainment privileges for members. Some of these rings are exclusive to select members in the Network, but there are also sex rings set up that cater to a wider membership, and are made available to any member who has gone through an initiation and provided blackmail insurance as an oath of silence and loyalty. Until a member has done so, they will never be aware that these rings exist, but when they do, a whole new world is opened to them that will draw them further into the Network. These members join into the lifestyle of the underground, where sex is heavily promoted and widely engaged in between members of these rings. Drugs are also cheaply and easily available to Network members once they have entered into this underground. Corruption is the main purpose of these underground activities, and it is part of the design of the Network system to bring as many members into it as possible. Since members are signing a lifetime contract when joining the Network, and young people are more easily enticed into corrupt activities, they are the most likely to eventually be drawn in, and their total corruption is only a matter of time.

The sex rings in particular provide an enticing introduction into a secret world with darker motives. Sex is used to tempt members into an underground society that caters to every sin and pleasure imaginable. This underground society is used to lead these members into ever deeper and darker levels of corruption. As soon as they get involved in the Network at this level and discover that they have this whole new source of pleasure and excitement available to them and they begin to explore it with a little guided influence, there’s no turning back for them.

One of the things that I feel is taking place at even deeper levels of this Network are actual satanic activities, including all manner of ritual abuse, satanic worship, and even human sacrifices. These activities are engaged in by those who control this Network, and this Network is their means for drawing the entire population into this as well. Therefore, they must maintain very tight security against its exposure, so full-blown mind-control is a necessity for any members who will reach these darker levels of the Network’s underground. This mind-control is applied to the extent that each member will have one or more ‘alter’ personalities created in them (either through trauma or hypnosis), and will be completely unaware of the fact. The different personalities are switched in and out through triggers, and prior programming will assure that these members are incapable of remembering or otherwise discovering their involvement in these dark activities. As the Network continues to draw in its members, more and more people are being led into these satanic aspects and being enslaved through this most insipid form of control.


Membership Motivations and Rewards


Members of this Network aren’t usually paid, but instead they will either volunteer themselves freely, be tricked into it, or forced. Usually, they begin doing it as part of something else that they’ve already committed themselves to, such as a church or business organization, and their Network activities are seen by them as part of their current commitments with that group. As such, neither the existence of the larger Network, nor the group’s connection to it, has to be known about by more than one or a few in their group (usually in leadership positions), and even then, their knowledge of the Network is still very limited. A group’s involvement in Network operations is just seen by its members as serving the group’s interests. Those members of the group who know anything about the larger Network will usually be affiliated with it through membership in another group and will be acting through their service to that other more deeply involved group to involve the current group in serving those interests as well.

Motivations to act in favor of the Network’s needs are provided to individual members or groups with carefully crafted cover stories that are specific to that member or group and are usually crafted around whatever a group’s official purpose is, or whatever can be used to motivate a member to take part in various tasks and operations. Usually, a member or group can be motivated with a simple appeal of ‘service to community’. Many people feel obligated and even honored to do something for their community when approached and asked in the right way, and so they can be easily led to think that they are doing so when they’re involved in Network activities. When they see the level of sophistication that’s used in these operations, they automatically assume that what they’re doing must be important and under the direction of a legitimate authority, no matter what they might be drawn into doing.

Of course, other motivators exist, as we’ve already seen, and these are used to draw in those people who aren’t so easily motivated by a sense of duty or obligation. In fact, these are the preferred type of people to draw into the Network, because they’re already closer to the mindset that this Network is intended to develop within the general population. Selfishness, greed, carnal pleasures, criminality, etc., are easier to take advantage of and use to control a person, so cultivating these traits serves the ultimate purpose of the Network.

As we’ve already seen, reward systems have been set up to cater to member’s pleasures in various ways, but these aren’t the only reward systems that exist. Virtually anything might be offered to entice a member to do the bidding of the Network, since those who control the Network have the power to fulfill just about any desire that a person might have, and people are always seeking pleasure and excitement.

Special projects are set up at the deeper levels of the Network that are involved in catering to the pleasures of members or rewarding them in some way. These special projects involve activities that might be carried out by a single member group, or they can be broken up into compartmentalized operations that involve various members or groups who perform their assigned tasks in isolation and remain unaware of the fuller operation, which will be an ongoing enterprise of some sort, such as a free adult website for members that exploits the private lives of targets.

Exploitation of targeted individuals is a high priority of the Network. In the example just mentioned, the tasks will be divided up so that one member might be tasked with entering a target’s residence and planting cameras in strategic locations such as the bathroom and bedroom, another will be tasked with capturing and editing footage and uploading it to the website, and another with maintaining the website. None of these members ever have to come in contact with the other members involved or know who they are or what they do. The member planting the cameras can be kept totally unaware of the exploitative purposes the footage will be put to, and might be led to believe that the cameras are for general surveillance purposes. The member who handles the editing of the footage can be kept unaware of the identity of the target and where they reside (which might be anywhere in the world). The webmaster can also be kept unaware of this information about the target, and may even be led to believe that the footage they receive is voluntarily submitted by people who are exhibitionists. Members who are given access to the website and can view this footage can be led to believe whatever they might be told, perhaps also believing that the target is an exhibitionist. Selected footage of a target might be made available to members that live in the target’s community, in order to influence those member’s actions towards the target, or it might be made available only to members who will never come in contact with the target, and offered as ‘entertainment’. Such a website might offer thousands of different video channels to choose from, so that a member can eavesdrop on any number of targets, watching and listening to them in the privacy of their own homes.

The above example is just one type of special project that is used for motivating and rewarding members who are admitted into the Network’s underground, and the possibilities for motivating members through rewards and exploiting targeted individuals is virtually unlimited.


The Network Phone System


The Network relies on various technologies to effectively keep all of its members invisibly ensnared within its electronic web of control and operating in isolation to each other. Every member requires a cell phone in order to take part in Network activities, and the cell phone provides a means for central command to track, communicate with, and monitor each member. Cell phones are very important to the functioning of this Network and its ultimate goal.

Those who are responsible for putting together this Network have thought very carefully about the security of their system and know that Network members will often be sloppy and stupid, so they have taken pains to secure against this while conducting their operations through cell phone communications.

With the levels of power of those who are involved in creating and maintaining this secret Network, the ability to bypass or change standard phone operating functions are relatively easy, and a member’s cell phone might be specially configured so that normal functionality is enhanced in order to implement special security measures against that member’s potential sloppiness or stupidity.

What follows describes how the security of the Network and member activities are able to be preserved against anyone who might accidentally come across a member’s cell phone. This section is intended as an outline so that readers can gain a better perspective of the situation and how it can be accomplished without any chance of exposure, and to show how gang-stalking operations can be conducted efficiently while maintaining tight security measures. Should someone outside the Network ever come across a member’s cell phone, this could otherwise lead to the Network’s exposure if any suspicious or incriminating information was ever to be discovered on the phone (such as command center telephone numbers, text messages related to operations or targets, etc.). Therefore, this section describes how precautions might be taken to minimize any possibility of discovery. It will serve to answer questions that any doubters might have as to the possibility that such a secret Network could ever possibly exist without risk of exposure.

Securing communications between central command and participating members:

  • All Network communications must be strictly conducted through text-based cell phone calls.

  • Member’s cell phones are registered on the central computer, and only calls from registered cell phones will be allowed to connect.

  • A member’s registered cell phone is required to use a nondescript name entry for the command center phone number held in the cell phone directory listing. A silent ring-tone should always be assigned to this number. The cell phone will also be configured so that text messages sent to or received from the command center can’t be saved or forwarded.

  • Members are assigned a personal identity number and must use it when calling into the Network commend center. This is necessary to validate who they are and to secure against unauthorized access by non-members. This personal identity number must be memorized for security reasons, and never written down or recorded anywhere that it might be found by others.

  • Member’s cell phones must have a phone lock feature activated whenever the member is away from their phone, with a special identity number that must be entered before any communications with the Network can be initiated. This further assures that there will be no unauthorized access to the Network or Network communications by non-members.

  • Lost or stolen cell phones must be reported immediately through a special 1-800 number in order that it can be deactivated from the system.

The above measures will effectively secure the Network against discovery and infiltration by non-members who might gain access to a member’s cell phone and attempt to connect with the commend center or otherwise discover confidential information related to the Network or its activities.

The weakest link in this system, no matter how it might be designed and operated, is going to be the carelessness of the participating members. The Network system is capable of implementing special cell phone hardware or software measures that will enhance a cell phone so that communications to and from the command center will be far more secure than could normally be possible with ordinary phone features. Such enhancements will include disabling copying, saving, and forwarding of Network communications. It will also include special monitoring capabilities, to assure that the cell phone isn’t tampered with. That any member’s cell phone should fall into the wrong hands and risk exposure of this Network, the participation of that member, or any details of Network activities or targets, demands that such special hardware/software enhancements are used, making the phone security measures listed earlier far less necessary. Nonetheless, the foregoing outline should give readers an idea of how such a system might be designed so that it would allow for secure cell phone networking and communications to be implemented.

The one thing that can’t normally be easily hidden on a member’s cell phone will be the phone number to the Network command center. Special enhancements can be made to the phone so the Network number isn’t even needed, and all Network communications can be automatically received and then erased once they’ve been viewed by the member, or after having been written and sent by the member. With this sort of setup, incoming Network calls will have special coded ring tones to signify various types of calls[1]:

Ordinary (non-network) call ring tone 1 (normal ring)

Network Query ring tone 2 (silent/vibrate 1)

Network Alert ring tone 3 (silent/vibrate 2)

Network Task ring tone 4 (silent/vibrate 3)


An ordinary incoming call will have whatever ring tone is normally assigned by the owner of the phone. Network calls, however, are always silent for security reasons, and might be one of three possible types: a query, an alert, or a task. A query call is an incoming Network call seeking assistance in an operation. An alert call warns when a target is in the immediate vicinity. A task call gives instructions to a member during an ongoing operation. These incoming communications are answered by entering a special key combination to bring it up on the phone’s screen.

There can also be a simple code system that’s used by members for communicating to the network’s command center. In order to respond to a query, alert, or task, the member enters a simple one or two digit code, depending on their response. If the member is inactive or on standby and wants to reject an incoming query for assistance, they might press 0 and then ‘send’. Otherwise, they might press 1 followed by ‘send’, and the command center would automatically respond back by sending more information about the query, which can be immediately displayed on the phone’s screen until another button is pressed, at which point it’s deleted.

This phone system is designed to make Network communications as secure and efficient as possible. During an operation, all participating members will be directly linked to the command center and their phones will receive and display Network messages instantaneously without the member having to press any buttons except when a response is necessary. This allows members who are engaged in a street theatre operation to receive information and instructions more quickly and perform their tasks more easily and with complete anonymity to other participating members while still maintaining the coordination of movements and timing. There are no delays in communicating like there are with normal cell phone communications, and the specialized functioning of the member’s cell phone makes it virtually impossible for these communications to be non-secure.

It is my experience that a target’s picture often seems to be circulated with any alert messages concerning the target that are distributed through the Network. These pictures will be updated as regularly as possible, and it’s not unlikely that there will be a gallery of different pictures and video clips of each target that are stored on the Network system that can be made available to members for their perusal, in order for them to familiarize themselves with a particular target’s appearance so they can properly identify them. However, for security reasons, a Network member will never be able to copy or store any of these pictures or other information on their own cell phone (or computer), and can only view them while connected to the Network.

The main foundational structure for this Network is the global electronic communications network. This provides the means to tie all of the other components of the system into this Network, which have each been introduced in rapid succession immediately after this foundation was in place. After the communications network was put in place, the proliferation of computers and computerized automation was the next component of the Network to be implemented, which serves to allow for a massive surveillance system (ECHELON) that was immediately put to use in compiling information on every individual and group within the general population. Immediately after this came the introduction of cell phones, which provided a way to expand the surveillance and information gathering while also providing the platform for applying mind-control programming to a large part of the population while being able to tailor that programming on an individual basis. Cell phones also offer tracking capabilities through internal GPS chips.

Cell phones have been very useful in the gang-stalking operations that Network members routinely engage in, and these operations are quickly becoming the new method of policing and punishing more and more people within the population who are becoming listed as targeted individuals. Cell phones are the main tool used in these gang-stalking operations, acting as a member’s only link to the Network and other members. Cell phones provide communications between Network members and central command in such a way that strict control of both the members and any information they might be privy to is always controlled and contained, assuring the continued security of the Network, its members, and its operations.


Cell Phones and Mind Manipulation


Most people own a cell phone and carry it wherever they go and are using them more and more often in communicating with friends, family, and whoever else they might ever talk to, and this not only makes cell phones perfect tools for surveillance, but also for mind-control. This is because a cell phone is capable of transmitting microwave frequencies that will affect the brainwaves of anyone standing within a few feet of it. Specific frequencies will induce specific symptoms, such as confusion, paranoia, aggression, suggestibility, etc. When the cell phone is held to the ear, these effects are much more intense. Cell phones can also be used to send subliminal audio messages via pulsed microwaves (V2K) to affect a person’s thoughts and actions without their awareness.

Members are expected to always have their cell phones nearby in case they need to be contacted in an emergency, and they might be told that it’s for their security against dangerous targets, or because they might be needed in an operation, but mind control is a significant part of the reason as well. As members become involved with the Network, they will be continuously subjected to very sophisticated electronic mind-control programming techniques day in and day out, and will never notice anything. The mind control will begin with basic behavioral conditioning through a continual stream of subliminal suggestions that can be custom designed for each member, based on psychological profiles that will reveal characteristics about them that can be taken advantage of for manipulation. These subliminal suggestions can be transmitted whether or not the phone is turned on, as long as it has a power source.

Subliminal programming has certain limitations. Its effect is short lasting when a suggestion is applied for only a short time, but when it’s applied regularly over a longer period, it begins to have a stronger and more lasting effect. Short-term effects are useful for influencing a person to immediately act a certain way on compulsion, while long-term effects are best suited for changing a person’s general attitudes and perceptions of things.

Specific microwave frequencies that affect a member to cause such feelings as aggression or fear can also be applied to members, but this is reserved for when it is most useful, such as at the precise moments when a member is in close proximity to a target, so as to help in influencing a desired response from that member as part of an operation.

Another more powerful form of mind control that can be applied through cell phones involves electronic hypnosis, which is effected through the use of specific electromagnetic frequencies to entrain the brainwaves of a person and create a temporary state of high suggestibility in them. After such a state is induced, suggestions or commands can be subliminally inserted directly into the subconscious without the person noticing anything unusual.[3] Hypnosis is far more versatile than subliminals. The hypnotic suggestions or instructions can be far more elaborate, and detection of being hypnotized is virtually impossible, both during and after the fact. Hypnotic suggestions or instructions will also have a much stronger and more certain effect than subliminals.

A third level of mind-control depends on whether a person has been implanted, and a cell phone can again be used to relay signals to and from the implants, so that signals can be sent to a specific person without affecting anyone else in the vicinity who has also been implanted, and very weak signals from the implant can be picked up when the cell phone is held to the ear.[4]

No matter what form of mind control a person might be subjected to, the Network can be used to control and direct them. Each Network member is certainly being subjected to mind control in one form or another, and in many cases it may even go so far as to involve trauma-induced alter personalities. Whatever the case might be, its application is always kept very covert and measures to safeguard against its discovery are taken whenever possible. Members are usually kept completely unaware of being manipulated and think that they’re in full control of their own thoughts and behaviors when really they will do whatever they’ve been instructed to do.

Each Network member undergoes a long-term programming schedule that’s been carefully designed and follows a regimented procedure to assure that it’s properly implemented and failsafe, and greater control of that member is achieved over time. This requires that progressive levels of mind-control programming are established in each member and each level of programming will have a particular intended result that must be fully achieved before that member will graduate to the next level of mind-control. Each of these levels of programming will be reflected in their level of involvement in the Network and its activities, so that the higher the level of programming, the more involved a member will be in Network operations and activities, and, more importantly, the more controllable they will be. Since the ultimate intention of the Network is to create a totally mind-controlled society of unwitting slaves who will serve the satanic elite, covert mind-control programming will begin to be subjected to every Network member as early as possible.

The different levels of mind-control that members will undergo can be assumed to follow a general progressive order to achieve certain necessary requirements. The first and foremost of these requirements is the continued security of the Network and the activities of its members. Further levels of programming will be more task-specific, and each group within the Network will have specific methods of mind-control programming for its members. Each new member of the Network is categorized according to the member group that they are recruited into, and that programming is further tailored for them depending on their psychological profiles, social situation, special skills, attitudes and beliefs, etc. Each of these groups will be designated general mind-control programming scripts according to the organization of that group, its goals, the type of activities it normally engages in, etc. Network members will be further categorized according to their usefulness in respect to the needs and goals of the Network, and further mind-control programming will be tailored to suit these needs and goals.

Although mind-control is a part of every group in the Network, the groups themselves will usually have no knowledge of this fact and it will all be handled covertly by the upper management levels of the Network and initiated solely through the Network system. The only exception to this is when a particular group has been cleared for involvement in special projects. There might be certain actions that members of a group will engage in as part of another member’s programming, but when this occurs, these actions will be conducted under some other pretext that relates to the normal activities of the group. Sometimes, a Network member might undergo special programming sessions where another member will be used to handle special programming procedures, such as when creating an alter personality in a member, which requires a specially trained programmer. Certain carefully selected members of the Network are trained in these skills and used for this purpose.

The first level of mind-control that all members are subjected to is the establishment of the loyalty of the member so that they will never reveal what secrets they might ever become privy to as part of the Network. This subjection might go so far as to involve trauma-based mind-control to create one or more alter personalities that can be called up to take over the member’s consciousness whenever they’re to be used in Network activities, but this is usually reserved for the deeper levels of initiation that are usually only ever reached by certain members and groups within the Network. More commonly, a member will undergo less intense methods of mind-control to achieve the required results. This is most often achieved through the use of advanced hypnosis techniques coupled with ongoing subliminal reinforcement, as described above.

Each level of mind-control programming will be dependant on the effectiveness of the previous levels, as well as other factors listed earlier on in this document. Since members of the Network are effectively making lifetime commitments by involving themselves in this system, much of the programming will be established for long-term involvement, and it will be progressive in its development so that neither the member nor anyone else will likely ever notice any changes in their personality. However, the member will be changed over time, most notably in their beliefs, attitudes, morals, and values, in order to become more compliant with Network goals and activities.

The Network is technology-based, with a carefully designed structure that serves to trap members within its sticky web so that there is no escape once they become involved. This Network has been long in planning and each component of the final overall structure has been carefully put in place each in turn and without it being obvious what these components effectively add up to now that they have all been connected together. Since the inception of its early technological roots, the Network has grown and expanded from isolated pockets of individuals and groups into a globally reaching interconnected web of control that has the capability to not only monitor and direct the events that take place in the lives of the individuals of an entire society, but also to mold and manipulate each of these individuals to think, speak, and act in whatever way the controllers might desire. Further, the Network incorporates whatever means will work to corrupt these individuals and break them from the morals and ethics that would otherwise allow for a peaceful and cooperative society based on respect and understanding. The Network is designed to destroy these higher ideals in the human species, and replace them with the perception of continual chaos and uncertainty that leaves every individual and group at the mercy of those who control this system. Those who join the Network become trapped inside of it. Those who don’t join become trapped outside of it.


Notes


[1] See Social Self-Destruction: A Secret War of Controlled Chaos at


[2] I urge readers who have not heard of these health and safety laws to research them further in order to understand how this reporting system works and how widespread it is.

[3] This method of mind-control incorporates RHIC-EDOM (Radio Hypnotic Intracerebral Control – Electronic Dissolution of Memory), which can remotely induce a hypnotic state in a person, deliver suggestions or instructions, and erase all memories and awareness of both the programming and the actions to be performed.

[4] Due to their very small size, electronic implants can only generate weak signal transmissions, and require some nearby relaying device to amplify the signal before re-transmitting it over greater distances. A specially rigged cell phone makes an ideal re-transmitter.


Friday, April 11, 2014

Still More Interesting Facts Surrounding Aaron Alexis and FFCHS

by Anthony Forwood



When the Aaron Alexis story broke, some TIs contacted FFCHS to advise they knew him from FFCHS programs, confirmed FFCHS board member, Timothy White.”


- Back in February of 2011, Alexis reported to a doctor that he was suffering from tinnitus. He stated that he had been suffering from it since 2009, when he was in the Navy. [1]

- A friend of Alexis’ in Fort Worth named Nutpisit Suthamtewakul claimed that Alexis “always thought someone was trying to hurt him”, and that “he was afraid of people”. [3] How far back this goes is uncertain, but it can be assumed that it was while Alexis was still in the military, since Fort Worth is a military base. This claim indicates that Alexis was already suffering from paranoia long before he ever got involved with FFCHS. This means that he would have already been at a point of suggestibility where he would likely buy into whatever FFCHS members might have told him or whatever he might have read on their website.

- Alexis had a past history of shooting guns at people (twice before), [1] which may have been something that FFCHS knew about if they were more involved with him than they’re letting on, and this knowledge could have been a deciding factor in using him as a high-profile shooter in order to create an incident that would both promote TIs as dangerous wackjobs in the MSM and give FFCHS some publicity to other potential members who for whatever reason might think they’re being targeted and are foolish enough to turn to them for help.

- The incident Alexis had at the Virginia airport occurred on August 4, and it involved a family that he aggressively confronted for some unexplained reason. [1] He began talking about hearing voices and being followed around shortly after this.

- A month before the shootings, Alexis started telling friends and coworkers that he was a victim of a secret government mind-control program. [2] We can see the possible influence of FFCHS here, since Alexis really had no way to be certain that he was involved in any mind-control program other than to be led to that idea through reading suggestive material on the FFCHS website and because he started hearing voices at about this time. He made no references to anything else that would have led him to believe this. He said nothing about the voices telling him he was involved in any program. However, in my own experience, I’ve noticed that FFCHS members are very quick to insist to TIs that the TI is a victim of electronic mind-control, merely because they show one or a few symptoms that might or might not be caused by it. They will deny any other possibilities, and even gang up on a TI and bombard them with claims in order to try to persuade them to believe what they say. Any TI who is already confused and desperate to understand what’s going on and is seeking any sort of support will tend to give in to such a tactic, at least until they have a chance to clear their heads and think rationally. However, once they accept this situation and allow these people to be their support structure, they never get a chance to clear their heads. In true cultic fashion, the beliefs that are instilled in them are continually reinforced and built on while the threat of abandonment by their support group is either subtly or not-so-subtly made evident if they choose to disagree. So, could Alexis have been involved with FFCHS members long enough to have been influenced this way? The evidence is beginning to show that the answer is yes. Further, the evidence suggests that this involvement is being deliberately covered up.

- FFCHS executive board member Max H. Williams states that he was the person who brought Alexis’ emails to the attention of the other FFCHS board members, and that this occurred after the FBI contacted Williams about the email exchanges. He states that the FBI agents produced an email from Alexis to him, as well as Williams’ response. [2][3] So where is that email response? What had Williams said to Alexis in that email? Why did the FBI approach Williams, when it was Derrick Robinson who supposedly had the longest exchange with Alexis? Was Williams in communication with Alexis prior to Sept. 1? Why was his email not released along with the others? What are they hiding? Is this email (or emails) what the FBI is hiding by not releasing them in an FOI request while allowing Derrick Robinson to freely publish the others?

- Max Williams is another ‘ex’-government employee, having worked in the State Department. [2] Add him to the list of probable government plants working within that highly questionable organization known as FFCHS.

- Apparently, Alexis contacted FFCHS again, just days before the shooting. [2] This completely contradicts the claim that the only emails received were those from Sept. 1 that have been published. What was in this email? Why hasn’t it been released? Why was this email only ever mentioned once, and never again? Why is FFCHS attempting to twist the story to make it appear that Alexis only contacted them on Sept. 1? The more I scour and re-scour news articles about this story and put the pieces together, the more these important little factoids stand out that would have otherwise been overlooked.

- Although all manner of electromagnetic frequencies can be involved in electronic weaponry (as most intelligent TIs know), FFCHS board member Timothy White insists that they are strictly ELF waves, and he says he has to constantly correct Derrick Robinson, who continually refers to microwaves. [2] This suggests two things: that neither Derrick Robinson or Timothy White seem to know anything about the technology (but I think that’s just a ploy used to mislead TIs), and that Alexis’ belief that ELF waves were being used on him stems directly from FFCHS (ELF waves aren’t known to cause V2K). The insistence that these weapons only use ELF waves completely disregards the known methods of inducing V2K, which most commonly uses microwaves. That FFCHS would attempt to disregard microwave technologies is very questionable. The misunderstandings that this will cause many TIs who trust these people’s supposed intelligence will certainly slow down their ability to deal with their problem. FFCHS must certainly realize this.

- Although it appears that a total of six emails were exchanged between FFCHS board members and Alexis, [4] this doesn’t account for those that Williams admitted to FBI agents having sent him, nor the most recent one that they received only a few days before the shooting. I posted all but the sixth of these published emails in my a recent blog (Was Washington Shooter Aaron Alexis an FFCHS ‘Success’?), and the sixth one would be the final one where Derrick Robinson suggested that they communicate through Instant Messaging, which Alexis never responded to. So where does Williams’ email exchange fit in? And what about the most recent one? Obviously, something is totally amiss here, and there were more exchanges going on than are being admitted to. Since only those emails that were exchanged between Derrick Robinson and Aaron Alexis have been released, and because a Freedom of Information request to the FBI for any information relating to FFCHS and Aaron Alexis resulted in the response that that information was exempt from FOI requests, we can be fairly certain that whatever was said between Aaron Alexis and Max Williams, and whatever was in that last email, is being covered up. The FBI wouldn’t bother to withhold all information while allowing FFCHS to release some of it. I believe that FFCHS’s involvement with Alexis was either a complete fabrication (with total government complicity), or else Alexis was being directed and controlled by someone at FFCHS (perhaps Max Williams?) as part of a government sanctioned shooting.

- An interesting statement that was made by Julianne McKinney (another ‘ex’-government agent deeply involved with FFCHS) in her report on gang-stalking and electronic harassment from as early as 1992, is the following:

The long-term objectives of these harassment and experimentation campaigns appear to be quite fundamental; viz.,

(1) induce a sense of perverted “loyalty” toward the very agencies engaged in the individual’s harassment, to confuse his or her priorities where the possibility of obtaining legal redress might be concerned;

(2) redirect the targeted individual’s feelings of hopelessness, anger and frustration toward racial and ethnic groups, and toward select, prominent political figures, to include the President of the United States; and

(3) force the individual to commit an act of violence, whether suicide or murder, under conditions which can be plausibly denied by the government.

A question arises as to how she could have possibly known this in 1992. At the time that she wrote her report, she had only interviewed about 20 to 30 people claiming to be targeted, and there hadn’t been enough time for things to unfold for this sort of conclusion to be drawn. I mean, after all, she’s saying (based only on her very small number of interviews) that TIs were being perverted in their loyalties to government agencies, that their frustration was being redirected towards select targets, and that they were being coerced to act violently. There’s very little in her report (that I can remember offhand) that would indicate that more than one or two of the people she interviewed had ever gone to or even contemplated such drastic measures. That all came later. She’s either a psychic, or she was preparing the stage for what was to come. As I will repeatedly say, we’re dealing with a MAJOR psyop that has been going on since the start of MKULTRA and which has many active arms, and gang-stalking and electronic harassment are just two small aspects of it. It includes satanic groups, secret societies, New Age cults, pedophile rings, serial killers, ‘lone nut’ shooters, drug trafficking networks, sex slavery, arms dealing, and of course, mind control and mind-control technologies.

Just to put McKinney’s statement into perspective, at the time that she wrote her report, satanically-inclined serial killers like Jeffrey Dahmer were at their greatest height and reports of satanic abuse were beginning to increase dramatically (a survey of 800 psychologists in the San Diego area in 1992 revealed that between them, they had received 5,731 reports of satanic ritual abuse from their patients), and the False memory Syndrome Foundation was established that year by known pedophiles and MKULTRA researchers to counter the growing claims of SRA and pedophilia that were directly linked to secret government programs like MKULTRA, and from those to the elite’s international pedophile/sex slave ring. But ‘lone nut’ shooters were still incredibly rare in 1992, and their numbers would only begin to increase in the following years. Interestingly, most of them that lived to tell about it would describe having heard voices that compelled them to act out Here’s a list of ‘lone nut’ shooters I’ve compiled that goes back to before McKinney’s report: Patrick Purdy in 1989, Carl Campbell in 1991, Wayne Lo in 1992, Alan Winterbourne in 1993, Ralph Tortorici in 1994, Christopher Shaw Scalley in 1995, Martin Bryant in 1996, Jillian Robbins in 1996, Luke Woodham and Grant Boyette in 1997, Michael Carneal in 1997, Mitchell Scott Johnson and Andrew Douglas Golden in 1998, Andrew Wurst in 1998, Kip Kinkel in 1998, Eric Harris and Dylan Klebold in 1999, Todd Cameron Smith in 1999, T.J. Solomon in 1999, Larry Gene Ashbrook in 1999, Seth Trickey in 1999, Michael McDermott in 2000, Charles Williams in 2001, Doug Williams in 2003, Jeff Weise in 2005, Kyle Aaron Huff in 2006, Charles Carl Roberts in 2006, Suleiman Talovic in 2007, Seung-Hui Cho in 2007, Richard Ayala in 2009, Tim Kretschmer in 2009, Jiverly Wong in 2009, Nidal Malik Hasan in 2009, Jared Lee Loughner in 2011, Eduardo Sencion in 2011, Ross Truett Ashley in 2011, T.J. Lane in 2012, Ian Stawicki in 2012, James Holmes in 2012, Wade Michael Page in 2012, Andrew Engeldinger in 2012, Jacob Tyler Roberts in 2012, Adam Lanza in 2012, and Aaron Alexis in 2013.

As I said, Julianne McKinney must either be psychic to have predicted that far back that TIs would be led to engage in such acts, or else she must have known something about the real agenda of the fascist US government’s terroristic plans for the future and was doing her part to begin to develop an online targeted community to be used for future ‘human resources’ (the internet was just coming online to the public at the time). I remember that her report was already being widely circulated among online conspiracy groups that early on, planting seeds in people’s minds.

If we consider McKinney’s statement above in light of the manner that FFCHS members routinely act, how loyal they are to Derrick Robinson and FFCHS, and how very possible it would be for such an organization to pervert their member’s loyalties while confusing their priorities where issues of legal redress might be concerned (see my repost of BobS’s blog about Derrick Robinson’s losing strategies and ineffectual methods), we can see that what McKinney was describing is exactly what FFCHS seems to be. All that’s missing are the hopeless, angry, and frustrated individuals who are ready to snap… Oh, wait a minute. That’s not right. They already had FFCHS member John Turner of Florida snap and kill his wife and neighbor before killing himself, and then more recently they had Aaron Alexis snap only a few days after he last contacted them. How many others are there that I haven’t yet heard about? How many of those wackjob FFCHS members who harass TIs online and promote the most ludicrous stories are ready to snap… or lead someone else to? (This deserves its own article, describing what FFCHS members did to Nana Faye in an attempt to make her snap. Maybe I’ll get to that some time in the future.)

As I said before, satanists love the double-cross, and this statement by McKinney reeks of one. They like to put the truth out there in plain sight but distorted in such a way as to mislead people in the opposite direction and right into a trap. Julianne McKinney laid it out exactly the way it is, but she wanted her readers to think only in terms of government agencies like the NSA, CIA, FBI, etc. FFCHS, being filled with ‘ex’-government agents that are forever tied to their government masters due to the lifelong oaths they’ve taken, makes it a government agency of sorts.

- If we consider the fact that Derrick Robinson, Julianne McKinney, Max Williams, and Robert Duncan ALL have deep ties to the government (or claim to), that they ALL claim to be TIs, and yet they ALL operate without any apparent repercussions from the government that they claim to be blowing the whistle on (although I have yet to hear any whistling), then we must seriously wonder how that can possibly be, when so many others are being targeted heavily for no apparent reason. After all, FFCHS admits that it’s ultimately the government that’s targeting people, and they claim to have insider information about the technology and to have even worked on it (in Robert Duncan’s case), and yet they consistently fail to utilize that knowledge in any way whatsoever to expose it or even help others find a way to defend themselves against it, except where it profits them personally (and even there, they provide nothing but highly questionable information that doesn’t reveal anything and only leads to false beliefs about the government’s technological capabilities). When was the last time any of them were stalked or harassed by the government, or by anyone else for that matter? They might say that they are, but like Robert Duncan, who interprets my public expose on him and my challenge to discuss his claims in public as ‘stalking’, all the while continually sending me taunting emails, you can be sure that the others in that group will twist facts and lie just the same if they feel it’s necessary to make themselves look legitimate. But as far as I know, Derrick Robinson only ever alludes to some vague past targeting that seems to have ended long ago, Julianne McKinney has NEVER claimed to be targeted, Robert Duncan says he was targeted and forced by his attackers to write his books (making them that much more likely to be disinformation) but doesn’t ever speak about any current targeting and acts exactly like any perp would act. Max Williams and Timothy White I know very little about at this point, but time will definitely tell.

- As for other members of FFCHS that I know about, Dee Hardin, who harasses FFCHS detractors on facebook, doesn’t appear to be any sort of TI at all, and has never described any sort of targeting experiences that I know of. Linda Johnson, who pretends to not like Dee Hardin but is actually working closely with her in this effort by schmoozing with potential targets in order to find out information for Dee, continually uses the same one incident to legitimize herself as a TI, but has nothing more than that to justify calling herself one. Paul Stayton, who I questioned about the merits of his posted claims on the FFCHS website, proved himself to have a typical perp mentality by the manner in which he responded to my questions, as can be seen elsewhere on my blog. Renate Detels, who lives in my city and who I met one day, is a totally paranoid wackjob who literally peers around corners and thinks that every passing stranger is a perp out to get her. You’re in great company when you hook up with FFCHS members! Just the sort of people you want around you when you’re dealing with this stuff for real! Not one of these people can explain how they’re so sure that their experiences are caused by what they claim, and they’re careful to never claim much other than the same old lines that are becoming rather worn out by over-use and sound like they were dictated to them to say. REAL TIs who KNOW that they’re being targeted and aren’t just guessing should be able to provide enough information to show that they took more than just one possibility into consideration before they drew any conclusions about their experiences, and having done so, they would be in a position to defend their beliefs about their experiences using logic and reason. None of these people that I’ve mentioned can do that, and none of them are even interested in doing so. So they obviously never have. They want to believe what they do, no matter how insane it sounds and no matter that such insane claims would never be accepted by anyone who had the power to help TIs. FFCHS knows this very well. These lying members must realize it as well, since they aren’t interested in helping TIs either, and only seek to pursuade them to believe the most ridiculous things. FFCHS wants people like Dee Hardin, Linda Johnson, Paul Stayton, and Renate Detels on their team, so that those gullible people who are easily led to believe in their insane claims will be drawn in, mind-fucked some more, and then sent out to promote the same wacky claims further, making the entire TI community sound like brainless idiots. THIS is the real agenda of FFCHS. And people like Aaron Alexis are just a token bonus for them to take cold-hearted advantage of for their own selfish publicity.

Not one FFCHS board member has shown any remorse for the tragedy that occurred in Washington on Sept. 16, 2013. They have not shown any concern about the matter other than how much publicity it gives them. Think about that, if you still think they’re a legitimate organization that truly has TI’s concerns at heart. Think about how Derrick Robinson dealt with Aaron Alexis, and how YOU would react if you needed immediate help and turned to them, only to be blown off so coldly. Think about that one last email that Alexis sent to them only a few days prior to the shooting, and ask yourself why it was downplayed to the point of being forgotten about and never mentioned again. Think about what it might have said, given the frustration that Alexis was already having in getting help from that organization. Think about why it might have been exempted from release by the FBI.

Don’t take things at face value. FFCHS is one arm of a major psyop campaign, and nothing that’s going on in the TI community is as simple or obvious as it might appear. Look at the little details that are first overlooked regarding the Alexis affair, which I have covered in my last three blogs. Think critically about these details, and how they DON’T add up to the ‘official’ story, but DO add up to an intentional deception and coverup on the part of FFCHS board members and their fascist government masters.

* * *

References:

[1] “Navy Yard Shooting: Gunman Aaron Alexis Convincingly Lied To Doctors At Veterans Affairs” – Kevin Freking
http://www.huffingtonpost.com/2014/01/31/navy-yard-shooting-gunman_n_4701033.html

[2] “Exclusive: Aaron Alexis Pre-Navy Yard Tragedy Letter Released” – Conspiracy Theories
http://beforeitsnews.com/conspiracy-theories/2013/10/exclusive-aaron-alexis-pre-navy-yard-tragedy-letter-released-2455450.html

[3] “Alexis May Have Sought to Confront ELF Attackers Inside Navy Yard” – Memory Hole
[This article has suddenly disappeared from the internet.]

[4] “Washington shooter Aaron Alexis bad White TV”