Sunday, August 31, 2014

TORTURE via DIRECTED ENERGY WEAPONS (DEW) : RADIO FREQUENCY, ELECTROMAGNETIC PULSED SHOCKS to FEET & LEGS : BIOLOGICAL DAMAGES SHOWING : RESIDENTIAL/COMMUNITY STREET TERRORISM DEW WEAPONS ACCESS TO WITH PREMEDITATED MALICIOUS HATE AND INTENT TORTURE & HARASS ME SO I WILL LEAVE/MOVE OUT OF THIS RESIDENCE & LOS ANGELES, CA COMMUNITY

31 August 2014 -

The following video was taken because the Directed Energy Radio Frequency/Electromagnetic Pulsed Shocks were ongoing throughout the day, and keeping me from sleeping because I was being Tortured via this Directed Energy Weapons Targeting.

I decided to take out my video camera and at times using the crude night vision was able to pick up on the trajectories of the Biological Damages that are occurring due to the Insidious Violent Tortures being inflicted by Community Based Street Terrorists with criminal and illegal access to Biological-Technological Non Kinetic Directed Energy Weapons of Mass Destruction, and INDISCRIMINATELY, VIOLENTLY, SADISTICALLY and REPEATEDLY TORTURE and HARASS me, in the HOPES that I will MOVE/LEAVE the RESIDENCE and COMMUNITY.

THE BIOLOGICAL DAMAGES due to these COMMUNITY STREET TERRORIST'S with CRIMINAL and ILLEGAL ACCESS to UNITED STATES DEPARTMENT OF DEFENSE - DIRECTED ENERGY WEAPONS CAPABILITIES -

1. Heavy Directed Energy Radio Frequency/Electromagnetic Pulsed Shocks being Targeted and Blasted at my Feet and Legs

2. Shows Trajectory of damages due to swelling, and other physically visible biological damages

3. DEW Weapons Torture inflicted INDISCRIMINATELY day and night, Early AM Hours like this Video are to:
a. Sleep Deprive
b. Provoke, so you will Scream out in Sheer Excruciating Pain - in the Early hours of the morning
c. Further criminal, illegal, non consensual experimental protocols, monitor biological effects, affects, and damages to repeated and constant over exposure to directed energy, radio frequency, electromagnetic/non ionizing radiation
d. Monitor how fast it takes to destroy tissue, veins, etc
e. Monitor possible Subcutaneous / Wireless Implanted Devices/Sensors locations to see how human guinea pigs Biology will : reject, accept where devices/sensors appear to have been injected, and to see how much damage, &/or how long said wireless subcutaneous devices/sensors can be utilized for.




(for best view click on link, video delays from blog site)

ELECTRONIC WARFARE: TELECOMMUNICATION / CELL PHONE RF SIGNAL INTERFERENCE DIALING INTO TALK SHOE

On 28 August 2014 The following Radio Frequency Signals Interference transpired after being Dropped from my Talk Shoe Call, and attempting to Dial Back into my show.




FROM 23 JUNE 2014 : INITIAL RADIO FREQUENCY SIGNALS INTERFERENCE 

(note: time & date on keychain spycamera cannot be changed, is a Generic from China, came without Start Up Disc)


(note: time & date on keychain spycamera cannot be changed, is a Generic from China, came without Start Up Disc)



Saturday, August 30, 2014

THE FACE VALUE/LOOKS of the PERP COMMUNITY : PERP TACTICS: COLOR SYNC - BLATANT OVERT RESIDENTIAL and COMMUNITY STREET TERRORISM, Continue -

30 August 2014

As a Targeted Individual, you need to become Familiar with this idiom/Term because it will help you in becoming more Critical in you ability to THINK, which will allow you to better understand what is taking place, once you become: Blacklisted for Targeting.  The Military Term is Asymmetrical / Unconventional Warfare, and Military Deception.  



"Take something at face value" is a commonly used idiom in the English language. To take something at face value is to simply accept it for what it seems to be on the surface. This idiom assumes that a piece of information has been given, and the recipient acknowledges it and believes it without putting any thought toward ulterior motives, hidden meanings, 

or anything else not blatantly apparent on the "face," or surface, of the information. 

... 
Often, the tendency of people to take things at face value is taken advantage of by advertisers and other people or groups that stand to benefit from a slight deception. Advertisements frequently use "fine print" to modify an earlier, more eye-catching statement, providing a hidden truth that many people will fail to notice.

 This is your Civilian Network of Perpetrators' in a Nutshell - all SURFACE, no Depths, No Critical Thinking, Can be Easily Manipulated by the Psychological Operations, and Narrative Network TEAMS, who prey upon this profiled knowledge about their Target Audience/s also known as the Civilian Population/s and Civilian Recruit/s



(Note: The Best Way to View the Video is to Click on the Link, there have been video sync delays when attempting to view the video from the blog)




You would NEVER GUESS that MOST ALL OF THESE RECRUITED CIVILIAN/S INDIVIDUAL/S are HEAVILY INVOLVED in a State/Corporate and Academic Nationwide (of Like Minded/Indoctrinated/Group Thinking) Network that is responsible for the; First Degree Murder, Attempted Murder, Sadistic Torture, Criminal, Illegal Non Consensual Human Experimentation, Hate Crimes, Stalking, Harassment, Vandalism, Theft, Public Mobbing, Public Humiliation and Degradation of Targeted Individual/s - YET THEY HAVE and CONTINUE like the below photographed Female in her Color of the Month Syn Outfit to SHOW UP at 901 S. Catalina, Los Angeles, CA, and/or in other Public Settings to TARGET Victim's like me who have been Blacklisted for Targeting.

- LOOKS CAN BE DECEIVING -


The Below YOU TUBE VIDEO will Outline basically the same type of Civilian Domestic Street Terrorism Tactic, as what you see above, whereby COLOR SYNCHRONIZATION and USE by the Network of Civilian Sleeper Cells, Informants, Snitches, Community Watch, Community Liaison', Neighborhood Watch Recruits' who deploy and execute based on Daily Instruction on what to Wear, Where to Be, What to Say - and What to Do -

And, in order to Self Empower, think of the Color/Pattern Schemes worn or used by the Civilian "Sleeper Cells" as nothing more than the Network of Multi-Cultural Perps Identifying themselves, not unlike the "Swastika" that was worn in days old, of the Unified front that derived from Nazi, Germany.  They are the Enemies to Freedom - period. 

(Note: The Best Way to View the Video is to Click on the Link, there have been video sync delays when attempting to view the video from the blog)



The following Photo Was taken on 29 August 2014, at approximately 17:04 PM PDT, and is  yet another Civilian Domestic Terrorist Recruit, who showed up at 901 S. Catalina, Los Angeles, CA to visit the elder Korean House Manager, who not only Actively and Aggressively Participate in my Targeting, via this Community and Residential Street Terrorism, but also Goes To CHURCH EVERY SUNDAY, and like the rest of the Korean Community who present themselves as Pilars of this Community and Society, but who are and have been capable of some of the most Aggressive Violent Targeting that I have Sustained.  

NOTE: SALMON/PEACH COLOR OF TOP OUTFIT
then scroll down to Video of Color Synchronization - being Utilized on Different Days - not only at this location, but also 905/907 S. Catalina, along with West Los Angeles via La Brea and Sixth.

JUST TO BE REAL CLEAR, Unlike the Milgram Experiment/s, what is being done to TARGETED INDIVIDUAL'S like myself are SADISTIC INFLICTION of TORTURE, PAIN, SUFFERING, CRIMINAL, ILLEGAL NON CONSENSUAL HUMAN EXPERIMENTATION, and the LITERAL BIOLOGICAL/PHYSICAL DAMAGES SUSTAINED via EXPERIMENTAL and FULLY DEVELOPED - DIRECTED ENERGY NON KINETIC/LESS LETHAL ANTI PERSONNEL WEAPONRY, and WEAPONIZED NEUROTECHNOLOGIES - in the Form of ELECTROMAGNETIC PULSES AND SHOCKS to Target Specific Regions of my Human Biology.

The Following Photos are the REAL BIOLOGICAL DAMAGES SUSTAINED

Right
Upper Thigh, Back Calf, Ankle and Foot



LEFT
Upper Thigh, and Back Calf



FULL VIDEO: MILGRAM EXPERIMENT Revisited

Sunday, August 24, 2014

POSSIBLE ILLEGAL WIRELESS SUBCUTANEOUS IMPLANTS LEFT BACK CALF - PINPOINTS TARGETING - BIOLOGICAL-TECHNOLOGICAL TERRORISM

24 August 2014

The following You Tube Video is yet another location where I have been able to show the Biological Damage being sustained to my human biology via what now appears to be Proof of Wireless Subcutaneous Implanted Devices and the biological maiming, mutilation, damages, and Offensive, deliberate infliction of Excruciating Pain, and Suffering, due to these Illegal, Non Consensual, without my knowledge - Wireless Biological-Technological Devices being criminally, and illegally placed within my human biology in order to CONTROL biological functions.






Scroll down page to View the Still Photos from 25 July 2014 that I uploaded to this blog to show the UPPER THIGHS, and Back of Right Calf Area. 

TORTURE and BIOLOGICAL DAMAGE to UPPER RIGHT THIGH, RIGHT CALF AREA, RIGHT INNER ANKLE, POINTS OF ENTRY MARKINGS, and LEFT THIGHS DUE TO CONSTANT DIRECT ENERGY, LESS LETHAL WEAPONS via TARGETED FLOOR ELECTRIC SHOCKS, and ELECTROMAGNETIC PULSED SHOCKS, TO FEET, ANKLES, LEGS and ARTERIES





Saturday, August 23, 2014

PERP WALK and EMP PULSES to Electronic Seen as FLASHES

20 August 2014:  This video is good for two reasons, one it outlines the Conspiracy to Obstruct and Cover Up at high levels, and a term called: 'PERP WALK.  Another is to show the Constant WHITE FLASHING PULSE that Blast onto the screen every few seconds.  This type of Interference is done via Military and National Security Grade Electronic Warfare and Computer Network Attacks to Disrupt the RF Signal Streaming the short excerpt/segment from the TV Series, "Suits." 

" I want to see you PERP WALK through the bullpen with your pretty little jacket covering your handcuffs" - Lewis says to the Head of a Powerful New York Law Firm.







This is an EXCELLENT Mid Season Ending for a Series entitled, "Suits."  Atty Lewis catches on to the Big Office Lie, Cover UP, and Confronts those involved.  


He Utilizes a Term called:

Definition:

A slang term that describes the practice sometimes employed by law enforcement authorities, notably in the U.S., of parading an arrested suspect in public, with members of the media usually in attendance. Short for "perpetrator walk," the alleged suspect is usually a white-collar or high-profile criminal. The perp walk often takes place either shortly after the suspect is first arrested at his or her residence or workplace, or when the suspect is on the way to court for an arraignment.

Another Definition of 


...  The perp walk arose incidentally from the need to transport a defendant from a police station to court after arrest, and the general prohibition of prior restraint under the U.S. Constitution's First Amendment. Law enforcement agencies often coordinate with the media in scheduling and arranging them. It has been criticized as a form of public humiliation that violates a defendant's right to privacy and is prejudicial to the presumption of innocence, and defended as promoting transparency in the criminal justice system

FOR TARGETED INDIVIDUALS who in particular work in the Corporate Setting, or High Profile Corporate Setting, It will have a much more Significant Resonance, as it did for me.  Because at the VERY TOP you will be Targeted utilizing the Tactics, Techniques utilized to Deploy and Execute WORKPLACE HARASSMENT, WORKPLACE MOBBING, and WORKPLACE TERRORISM.


BLOCKING CURRENT PHOTOS OF ME TO FAMILY MEMBERS -

23 August 2014

I have noticed that when I send a Current Photo of Myself to Family Members, showing that I am NOT in some TERRIBLE STATE - but actually STILL ALIVE, etc.  These Photos are not sent off, blocked from being sent, or else never gotten until much later.

What this shows me is how this entire NARRATIVE DRIVEN BULLSHIT actually OPERATES, meaning THESE TERRORIST'S need to DRIVE THE NARRATIVES to SUIT their DOMESTIC TERRORIST PURPOSES -

Upon knowing this they HIJACK my ELECTRONIC CAPABILITIES i.e. Cyber or Telecommunications, and will block various Photos, etc from being forwarded.  I can tell instantly because there is a long delay, of Proof of Delivery that arrives in my Cell Phone to let me know the Message was delivered. 

I have noticed that any self photos to family members are INSTANTLY BLOCKED from reaching the Destination of family, or forwarded at a much later time.  THIS BEGINS TO PROVE THE FACT that ANYTHING that shows me - OTHER than the NEGATIVE WAYS this DOMESTIC TERRORIST Organization attempts to - IS IMMEDIATELY BLOCKED - So these TERRORIST'S can CONTINUE TO SHAPE NEGATIVE FALSE LIGHT -

Taken and sent to a relative for a Birthday Picnic in Northern California - Saturday, August 23, 2014 - and Immediately BLOCKED - the Response was not from the Family Member I sent it to, but a Domestic Terrorist Civilian Perp with Criminal Override Access to My Telecommunication Capabilities.


As a Targeted Individual who Host's a Live Talk and Chat Show, you being to understand the Characteristics of how someone writes, or responds, and even when they come into my shows Live Chat Room, as another User, their Style becomes recognized.  The moment there is a LONG DELAY when I send a Text message or any forms of communication out to relatives - and the response is uncharacteristic of that particular family member - I can TELL that the COMMUNICATIONS have been CRIMINALLY HIJACKED and the PERSON responding is a member of this Domestic/International Terrorist Organization committing FRAUD.

Eventually, the messages are sent through, but when it comes to RECENT PHOTOS - very rarely.

Here is the PATHWAY of the TEXT MESSAGE sent this MORNING to my Bay Area Relative, and what the Difference Looks Like when Your Electronic Communications i.e. PDA / CELL PHONE has been Compromised / Hijacked by "MAN IN THE MIDDLE" and/or FOX ACID SERVER Capabilities.





Friday, August 22, 2014

COMPUTER NETWORK ATTACKS : SIGN IN / LOG IN SCREEN WILL NOT ACCEPT MY USER NAME AND/OR PASSWORD : MICROSOFT LIVE.COM, TWITTER, AND COMPLETELY FUCKED UP INTERNET BECAUSE OF THESE BREACHES

22 August 2014

: CYBER WEAPONS OF MASS DESTRUCTION :


WHAT THIS DOES IS ESTABLISH NOT ISOLATED OR RANDOM - BUT STRATEGIC CYBER ATTACKS UPON SIGN IN / LOG IN SCREENS of TWO DIFFERENT CORPORATIONS - I.E. MICROSOFT, Inc LIVE.COM and TWITTER, Inc.  Both Corporations Network breaches, DENIED ME ACCESS after typing My USER NAME and PASSWORD into their SIGN IN SCREENS of each respective Corporation

As such, this becomes STRATEGIC DENIAL OF ACCESS to CORPORATE ONLINE ACCOUNTS - because NOT ONE but TWO EXACT SAME DENIAL OF ACCESS TRANSPIRED.  

The following You Tube Videos is a Day in the Life of a Targeted Individual who sustains Cyber Terrorist Attacks on a Regular Basis.  This is done in the form of Electronic Warfare, Computer and Telecommunication Attacks, Computer and Telecommunication Network Exploitations, and Remote Electronic Harassment.

I spent five hours on the phone with Microsoft being Transferred to Every Department but Technical Support and/or Microsoft Security, due to an Extensive Security Breach that is not Fixed.  This is to show What was happening with my Initial attempt to Log into my LIVE.com Account - via User Name and Password -  - UPON REQUESTING that this SECURITY CODE be EMAILED - it NEVER ARRIVED in my YAHOO EMAIL ACCOUNT - THUS the PHONE CALL TO MICROSOFT - for FURTHER - Access Information -




From this point, I decided to check into my TWITTER Account and the same DENIAL OF ACCESS upon Logging in with my USER NAME and PASSWORD for my TWITTER Account.

Upon Checking My Email - I had Three Messages that Instructed me there was a SECURITY ISSUES and LIKE MICROSOFT - NOW REQUIRED A SPECIAL - CODE - in order to RE-ACCESS MY ACCOUNT -






AND TO ADD FINAL INSULT - DUE TO THIS EXTENSIVE FUCKING UP OF THE INTERNET - BY THE DEPARTMENT OF DEFENSE / NATIONAL SECURITY / PRIVATE CYBER AND SECURITY CIVILIAN CONTRACTOR'S - AND THE TECH INDUSTRY WHO ALLOWED THESE FUCK HOLE TO BREACH THE ENTIRE FUCKING INTERNET SECURITY - THIS IS WHAT SHOWS UP WHEN I SIMPLY WANT TO ACCESS THE YAHOO HOME PAGE -

A BUNCH OF BULLSHIT CODE THAT TAKES OVER THE HOME PAGE SCREEN -


UPDATE AT 8:19 PM EDT

U.S. Retailers Warned Of Possible Hacking

WASHINGTON (AP) — More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday.

The government urged businesses of all sizes to scan their point-of-sale systems for software known as "Backoff," discovered last October. It previously explained in detail how the software operates and how retailers could find and remove it.

  (What does this mean - NOT just 1,000 individual stores but 1,000 U.S. Retailers i.e. Target, Neiman Marcus, UPS, and however many of THEIR STORES have been Breached/Compromised?   Those are just THREE that have been NAMED publicly  - the Names of the other 997 RETAILER'S have not been Published publicly

But think if Walmart, Costco, Macy's, Kohl's, Forever 21, etc were also breached, and how many stores they have throughout the Nation that may have also been compromised and WAIT, that is only FIVE more RETAILER'S added to the already NAMED (3) - What about the OTHER 992 RETAILERS? 

- HERE IS AN EXAMPLE OF JUST ONE RETAILER - 

United Parcel Service (UPS) - 51 Stores, in 24 States of Customers Data BREACHED. 

United Parcel Service has discovered a computer breach at 51 stores, making Big Brown the latest retailer to lose customer data.

UPS (UPS) said that the hacking had escaped detection at stores in 24 states, or around 1% of its locations. At most stores, the malware attack occurred after March 26, and was eliminated by August 11. 

This is HOW HUGE this SECURITY BREACH TRULY IS...



NOTE:  I AM SEARCHING OPTIONS ON HOW TO UPLOAD THE FIVE HOUR RECORDING WITH MICROSOFT CORPORATION AND THEIR CUSTOMER SERVICE AND THE LITERAL TRANSFERRING, HANG UPS, AND CALL BACKS NECESSARY - AND YET ZERO RESOLUTION - TO THE HUGE SECURITY BREACH - THAT TRANSPIRED -



Tuesday, August 19, 2014

COMPUTER NETWORK EXPLOITATION /ATTACK and the DESTRUCTION of the INTERNET

19 August 2014

CYBER WEAPONS OF MASS DESTRUCTION

The following Image is what happens when there is constant BACK DOOR CRIMINAL HACKING Into ONLINE ACTIVITIES - and the CORRUPTION of FILES DUE to these CONSTANT ATTACKS. 

JUST LOADING ONTO YAHOO BECOMES AN ATTACK AGAINST ONLINE CAPABILITIES. 

UPDATE: 22 August 2014

Remember, most all of this information TRANSMITS via the INTERNET to their Corporate Offices via Each Location Store.  1,000 U.S. Retailers' means say a Target with Thousands of Stores, or Walmart with even more Stores - It does not mean 1,000 individual stores were breached, but  it means 1,000 Retail Outlets i.e. Target, Neiman Marcus, UPS, etc with possibly Thousands of Stores.  And this MASSIVE SECURITY BREACH is because of these CIVILIAN PERPS who are being PROVIDED CRIMINAL ACCESS and TRAINING in HOW TO HACK - to INCLUDE the USE OF MALWARE -

U.S. Retailers Warned Of Possible Hacking

WASHINGTON (AP) — More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday.

The government urged businesses of all sizes to scan their point-of-sale systems for software known as "Backoff," discovered last October. It previously explained in detail how the software operates and how retailers could find and remove it.

Just to DRIVE this IMMINENT THREAT of this CIVILIAN NETWORK OF PERPS - HOME - The following is from January, 2014 whereby 40% of the Entire South Korean Population was affected by a Banking Security Breach.  What DRIVES IT HOME is that the VAST MAJORITY of RECRUITS and TRAINEES where I am located Since 2013 - is in KOREA TOWN LOS ANGELES, CA - and the Vast Majority of Young Recruits' and Trainee's who do not even speak English are being given Criminal and Illegal Access to Department of Defense / National Security Grade ELECTRONIC WARFARE, COMPUTER NETWORK EXPLOITATION, COMPUTER NETWORK ATTACKS, MALWARE, ENCRYPTION BREAKING Training Capabilities, which would make it POSSIBLE for such a SECURITY BREACH to take place in SOUTH KOREA -by EXPORTING these CIVILIAN PERPS who are being Recruited and Trained in the United States, back to their COUNTRY OF ORIGIN... 

DOES SOUTH KOREA - HAVE A DATA SECURITY BREACH IN CREDIT CARDS THAT AFFECTED 40% OF THE SOUTH KOREAN POPULATION


...  
This is what happened recently with three credit card firms in South Korea, where the financial and personal data belonging to users of at least 20 million, in a country of 50 million, was stolen by an employee, who worked as a temporary consultant at Korean Credit Bureau (KCB).
Confidential data of customers ranging from the minister-level officials to celebrities, including their phone numbers, addresses, credit card numbers, and even some banking records, have been leaked from Kookmin Bank, Shinhan Bank and several other commercial banks”,

Monday, August 18, 2014

CA 6FNG463 TRANSIENT From 20 July, RETURNS And Is Picked UP by a HANDLER in a GREEN Ford Explorer, Returns & Leaves

18 August 2014

DOMESTIC STREET TERRORIST ACTIVITIES CONTINUE WITH CIVILIAN NON GANG/ORGANIZED CRIME - STATE, CORPORATE & ACADEMIA, SPONSORED, SANCTIONED, AND COVERED UP NETWORK OF CIVILIAN SLEEPER CELLS FOR THE STATE 

The Transient Lewis who drove into the back parking area in his Green Minivan, showed up again today, 18 August 2014 at approximately 17:45 PM PDT.  He parks his Minivan blocking the Gate off James E. Woods, and is standing there WAITING, a Much NEWER MODEL GREEN FORD EXPLORER pulls to the side and this Transient Lewis gets into the SUV.

The vehicle turns the Corner onto S. Catalina, drives up to about 911/913 S. Catalina, parks, then I see this Transient Lewis Exit the Green SUV, walks back to his Minivan and Drives off.

What this now appears to ESTABLISH is how in this case a TRANSIENT is PAID by someone within this DOMESTIC TERRORIST NETWORK - PROVIDED INSTRUCTIONS and PAID on what to DO.  Then TAKES OFF.





Here is the Audio from 20 July 2014 - Where I am asking this Transient WHY he thought it was ALRIGHT to ENTER this Building and proceed to take a shower.   I was called to the LAPD to Speak about this incident, to a Detective Chi.  Some good that REPORT DID - the Transient Returns.


CA 6FNG463 TRANSIENT/Possibly Paid,Walks Into Open Exterior Door & Take a Shower on My Side of Bldg   




Saturday, August 16, 2014

ELECTRONIC WARFARE - TELECOMMUNICATIONS TAMPERING and BLOCKING

16 August 2014
19:18 PM PDT

Quick Note:  An Incoming Call from a Relative was Cut off, when I attempted to call this person back, it went into voice mail.  I have also attempted to Text Message this Relative, along with another Relative, and in both cases, it is complete NO RESPONSE.

What this shows is the MAN IN THE MIDDLE - via FOX ACID SERVER - that will IMMEDIATELY CUT OFF - My Ability to COMMUNICATE FREELY with OUTSIDE Parties, and the ILLEGAL and CRIMINAL BLOCKING of not just Online, Internet, Email, but HEAVY TELECOMMUNICATION - CRIMINAL OBSTRUCTION -

From the Original Der Spiegel Article that Identified Tailored Access Operations (TAO), the elite Electronic Warfare and Computer Network Exploitation that transpires

Inside TAO: Documents Reveal Top NSA Hacking Unit


One of the hackers' key tasks is the offensive infiltration of target computers with so-called implants or with large numbers of Trojans. They've bestowed their spying tools with illustrious monikers like "ANGRY NEIGHBOR," "HOWLERMONKEY" or "WATERWITCH." These names may sound cute, but the tools they describe are both aggressive and effective. 

According to details in Washington's current budget plan for the US intelligence services, around 85,000 computers worldwide are projected to be infiltrated by the NSA specialists by the end of this year. By far the majority of these "implants" are conducted by TAO teams via the Internet.

(The "Implants"/AntChips are powered by a CTX4000 which generates a Continuous Radar Waveform into the Living Space of the Target in order to Infiltrate (hack, wiretap, monitor, etc)  and Ex-filtrate (remove, alter, destroy documents, etc.)  Information, and acts like an Internet Connection to Infiltrate and Ex-Filtrate information.  )

How The NSA Pulls Off Man-In-The-Middle Attacks: With Help From The Telcos

from the but-of-course dept

We already covered the latest Guardian report on the NSA and GCHQ's attempts to compromise Tor. While those have failed to directly break Tor, they were more successful effectively exploiting vulnerabilities in Firefox to target certain Tor users. Bruce Schneier has a more focused article on how those attacks worked, and as a part of that, detailed how the NSA and GCHQ are effectively able to do man-in-the-middle attacks on giant websites, something that is really only possible because of the major telcos letting the NSA put servers directly off the backbone. As we noted last month, buried in one of the earlier Snowden leaks was the news that the GCHQ and NSA were likely running man-in-the-middle attacks on Google. The latest leaks show why those work. As Schneier explains:
To trick targets into visiting a FoxAcid server, the NSA relies on its secret partnerships with US telecoms companies. As part of the Turmoil system, the NSA places secret servers, codenamed Quantum, at key places on the internet backbone. This placement ensures that they can react faster than other websites can. By exploiting that speed difference, these servers can impersonate a visited website to the target before the legitimate website can respond, thereby tricking the target's browser to visit a Foxacid server.

In the academic literature, these are called "man-on-the-middle" attacks, and have been known to the commercial and academic security communities. More specifically, they are examples of "man-on-the-side" attacks.

They are hard for any organization other than the NSA to reliably execute, because they require the attacker to have a privileged position on the internet backbone, and exploit a "race condition" between the NSA server and the legitimate website. This top-secret NSA diagram, made public last month, shows a Quantum server impersonating Google in this type of attack.

The NSA uses these fast Quantum servers to execute a packet injection attack, which surreptitiously redirects the target to the FoxAcid server. An article in the German magazine Spiegel, based on additional top secret Snowden documents, mentions an NSA developed attack technology with the name of QuantumInsert that performs redirection attacks. Another top-secret Tor presentation provided by Snowden mentions QuantumCookie to force cookies onto target browsers, and another Quantum program to "degrade/deny/disrupt Tor access".
Schneier also notes that this is basically the same technique the Chinese have used for their Great Firewall. In other words, the complicit nature of the telcos in basically giving the NSA and GCHQ incredibly privileged access to the backbone is part of what allows them to conduct those kinds of man-in-the-middle attacks. It still amazes me that there isn't more outrage over the role of the major telcos in all of this.
The other interesting thing about the FoxAcid servers is that it's basically a system that gives the NSA a rotating menu of ways to exploit a visitor who gets hooked on one of their servers. It also notes that the NSA is pretty careful about how it uses various exploits, such that "low-value exploits" are used against more technically sophisticated targets, recognizing that they're more likely to be discovered, and thus burned. They save the "most valuable exploits" for less technically savvy targets, and also the most important targets. This is hardly surprising, but interesting to see the level with which they plan these things out.

GROUP THINK / MOB MENTALITY: CIVILIAN PERP COMMUNITY, , THE SADISTIC BRUTALITY AGAINST AN AUTISTIC TEEN, AND THE FBI SEVEN STAGE HATE MODEL

The following Graphic Video of Sheer Violence and Brutality against an Autistic Teen is the EXACT Violent Mindset of the Civilian Network of Informant/Sleeper Cells who are under this False Belief System that Utilizing Sheer Violence Upon and Against an Unarmed, Defenseless "Target" is not only alright, cheered and celebrated, but also NO ONE STEPS IN to help this Disabled Child.

The Video will provide Targeted Victims' with a much more CLEAR PICTURE of the MENTALITY and MINDSET of:  Who, What, and How this Vast Nationwide Network of Civilian Street Terrorism Perpetrators' being provided State, Corporate and Academia, sponsorship, sanctioning, and cover up for Heinous and Egregious Crimes of Sheer and Brutal Violence upon and against and TOTALLY DEFENSELESS HUMAN BEING -

Although, Target's Sustain Different forms of Violence, to include Stalking, Harassment, Theft, Vandalism, Assault, Torture by Direct Energy Weapons, and have Come Forward to ALL PROPER AUTHORITIES at the Local, State, and Federal Levels, Non Government Organizations, Lawyer after Lawyer and Law Firm after Law Firm -

This Video is to SHOW the MENTALITY and MINDSET OF GROUP THINK, MOB MENTALITY, and THEIR FALSE BELIEF IN EXCEPTIONAL SUPERIORITY OVER THOSE DEEMED LESSOR, in addition to THEIR TRUE SADISTIC, BRUTAL and VIOLENT NATURES -

Not being inflicted by Stereotype Gangsters and Organized Criminal's but EVERYDAY PERPS who have JOINED FORCES with this Domestic Terrorist Organization, State, Corporate, and Academia, SANCTIONED, SPONSORED, and COVERED UP. 

Disabled Boy Aaron Hill Beat Down in Florida ( #JusticeForAaron ) 



Teen Arrested After Video Of Him Beating Boy With Autism Goes Viral: Cops (GRAPHIC VIDEO)

Two people have been arrested after a vicious beating of a child with autism went viral.
Andrew Wheeler, 18, was arrested last week for allegedly beating 16-year-old Aaron Hill at a party in Okeechobee, Florida last Friday, according to WPTV.

GRAPHIC video of the beating is above. A man who police say is Wheeler can be seen punching and kicking Hill -- who is on the autism spectrum -- while the teen covers his head to protect himself from the attack.

At one point Wheeler drags Hill by his hair across the floor.
In a statement to police, Hill said Wheeler choked him for so long that he passed out and, when he came to, Wheeler was pummeling him.

Here is the ATTACKER WHEELER BLAMING the AUTISTIC VICTIM HILL ...
Wheeler claims when he attempted to take the teen outside he tried to strike Wheeler.

THIS NATIONWIDE NETWORK OF CIVILIAN INFORMANTS/SLEEPER CELL PERPS CAN BE DESCRIBED via the following:


The Psychopathology of Hate
Hate masks personal insecurities. Not all insecure people are haters, but all haters are insecure people. Hate elevates the hater above the hated. Haters cannot stop hating without exposing their personal insecurities. Haters can only stop hating when they face their insecurities.

Stage 1: The Haters Gather
Haters rarely hate alone. They feel compelled, almost driven, to entreat others to hate as they do. Peer validation bolsters a sense of self-worth and, at the same time, prevents introspection, which reveals personal insecurities. Individuals who are otherwise ineffective become empowered when they join groups, which also provide anonymity and diminished accountability.

Stage 2: The Hate Group Defines Itself
Hate groups form identities through symbols, rituals, and mythologies, which enhance the members' status and, at the same time, degrade the object of their hate. For example, skinhead groups may adopt the swastika, the iron cross, the Confederate flag, and other supremacist symbols. Group-specific symbols or clothing often differentiate hate groups. Group rituals, such as hand signals and secret greetings, further fortify members. Hate groups, especially skinhead groups, usually incorporate some form of self-sacrifice, which allows haters to willingly jeopardize their well-being for the greater good of the cause. Giving one's life to a cause provides the ultimate sense 

Stage 3: The Hate Group Disparages the Target (I would also add Provokes the Target)
Hate is the glue that binds haters to one another and to a common cause. By verbally debasing the object of their hate, haters enhance their self-image, as well as their group status. In skinhead groups, racist song lyrics and hate literature provide an environment wherein hate flourishes. The life span of aggressive impulses increases with ideation. In other words, the more often a person thinks about aggression, the greater the chance for aggressive behavior to occur. Thus, after constant verbal denigration, haters progress to the next more acrimonious stage.

Stage 4: The Hate Group Taunts the Target
Hate, by its nature, changes incrementally. Time cools the fire of hate, thus forcing the hater to look inward. To avoid introspection, haters use ever-increasing degrees of rhetoric and violence to maintain high levels of agitation. Taunts and offensive gestures serve this purpose. In this stage, skinheads typically shout racial slurs from moving cars or from afar. Nazi salutes and other hand signals often accompany racial epithets. Racist graffiti also begins to appear in areas where skinheads loiter. Most skinhead groups claim turf proximate to the neighborhoods in which they live.

Stage 5: The Hate Group Attacks the Target Without Weapons
This stage is critical because it differentiates vocally abusive haters from physically abusive ones. In this stage, hate groups become more aggressive, prowling their turf seeking vulnerable targets. Violence coalesces hate groups and further isolates them from mainstream society. Skinheads, almost without exception, attack in groups and target weaker victims. The adrenaline "high" intoxicates the attackers. The initial adrenaline surge lasts for several minutes; however, the effects of adrenaline keep the body in a state of heightened alert for up to several days. Each successive anger-provoking thought or action builds on residual adrenaline and triggers a more violent response than the one that originally initiated the sequence. Anger builds on anger.

Stage 6: The Hate Group Attacks the Target with Weapons
Haters prefer weapons, such as broken bottles, baseball bats, blunt objects, screwdrivers, and belt buckles. These types of weapons require the attacker to be close to the victim, which further demonstrates the depth of personal anger. Attackers can discharge firearms at a distance, thus precluding personal contact. Close-in onslaughts require the assailants to see their victims eye-to-eye and to become bloodied during the assault. Hands-on violence allows skinheads to express their hate in a way a gun cannot. Personal contact empowers and fulfills a deep-seated need to have dominance over others.

Stage 7: The Hate Group Destroys the Target
The ultimate goal of haters is to destroy the object of their hate. Mastery over life and death imbues the hater with godlike power and omnipotence, which, in turn, facilitate further acts of violence. With this power comes a great sense of self-worth and value, the very qualities haters lack. However, in reality, hate physically and psychologically destroys both the hater and the hated.

HACKING: EXTERNAL PC CHROME BROWSER KEEPS OVERRIDING MY MAC FIREFOX WEB BROWSER

16 August 2014

Since the Latest Groups of Trainee's who have been provided warrantless, criminal and illegal access to my computer's online capabilities, the LATEST in a Long Series of Online Electronic Warfare, Computer Network Attacks, and Computer Network Exploitation Transpires.

In this case, upon utilizing my MAC and Firefox Web Browser for online searches, article links, or accessing accounts i.e. Email, You Tube, Blog, etc. an UNRESPONSIVE SCRIPT Error Message Pops Up and COMPLETELY LOCKS DOWN MY ABILITY to STOP the Script from Running, Exit Out of the Script, or Further Utilize Firefox for any additional web browsing. 

Once the SITE I am currently in i.e. be it personal accounts, to online sites i.e. Democracy Now, New York Times, etc - will BECOME UNRESPONSIVE -  with the following Text of the Unresponsive Script.


ERROR Message reads, Aug 14, 2014 @ 11:07AM:  
Warning: Unresponsive script
A script on this page may be busy, or it may have stopped responding.  You can stop the script now, or you can continue to see if the script will complete
Script: chrome://browser/content/browser.js:16766

ERROR Message reads: 17 August 2014: 01:12 am 
Warning: Unresponsive script
A script on this page may be busy, or it may have stopped responding.  You can stop the script now, or you can continue to see if the script will complete
Script: chrome://global/content/bindings/popup.xml:221


This ERROR appears to be transpiring because whomever is CRIMINALLY and ILLEGALLY HACKING INTO MY SYSTEM AND NETWORK - is UTILIZING A PERSONAL COMPUTER (PC) and CHROME as THEIR WEB BROWSER.  

It is CONFLICTING with my MAC and FIREFOX Web Browser, and completely SHUTTING DOWN, LOCKING DOWN, AND STOPPING ME from dong anything further be it while in a Private Account i.e. E-Mail, Blog, You Tube Channel, etc or basic Web Browsing i.e. reading links from News Articles i.e. New York Time, Washington Post, to watching a video stream from a particular website i.e. Democracy Now! - 

The POINT - this Criminal Hacking is INTERFERING with my legal right to MY PRIVATE ACCESS into PERSONAL ACCOUNTS, to MY RIGHTS to READING ONLINE CONTENT/NEWS to MY RIGHTS to VIEW VIDEO STREAMING from a Particular Website.  

IT ALSO SHOWS THE THE TEAM THAT IS CRIMINALLY and ILLEGALLY ACCESSING MY PRIVATE ONLINE CAPABILITIES - IS UTILIZING
1. A PERSONAL COMPUTER (PC)
2. using GOOGLE CHROME

Since, I Utilize NEITHER it stand to CLEAR REASON that these CRIMINALS ARE - Hence the CONSTANT UNRESPONSIVE SCRIPT that KEEPS LOCKING UP MY COMPUTER - 



Friday, August 15, 2014

MALICIOUS PROSECUTION - BLAME THE VICTIM - STARDARD OPERATING PROCEDURE WHEN YOU ARE TARGETED

15 August 2014

The following Article and Image from Huffington Post 

Ferguson Cops Once Beat An Innocent Man Then Charged Him For Bleeding On Their Uniforms  

 

The officers got the wrong man, but charged him anyway—with getting his blood on their uniforms. How the Ferguson PD ran the town where Michael Brown was gunned down.
Police in Ferguson, Missouri, once charged a man with destruction of property for bleeding on their uniforms while four of them allegedly beat him...

 

Victim of Anti-Gay Hate Crime Luke O’Donovan Sentenced to 10 Years for Self-Defense: Family & Friends Rally in Support while Attackers Remain Free

 

On December 31, 2012, O’Donovan was attacked, beaten and stabbed by at least five men shouting homophobic slurs at a New Year’s Eve party. O’Donovan defended himself with a pocketknife and left the scene, receiving treatment for stab wounds and injuries to his head and body at an Atlanta Medical Center. Hours later, police arrested O’Donovan as he was receiving treatment, charging him five counts of felony aggravated assault with a deadly weapon. A superseding charge of attempted murder was handed down to O’Donovan at a later date.

This is AKIN to what is known as 

- MALICIOUS PROSECUTION -
Where it is Decided, generally by someone in a Position of Power - Who is Either Attempting to Cover Up Crimes they or Others within their Circle have Committed, or Decides that an Individual is GUILTY, and Goes about Finding Something That can be Pinned/Charged Against the Victim, generally, Criminally.  

An action for damages brought by one against whom a civil suit or criminal proceeding has been unsuccessfully commenced without Probable Cause and for a purpose other than that of bringing the alleged offender to justice.

An action for malicious prosecution is the remedy for baseless and malicious litigation. It is not limited to criminal prosecutions but may be brought in response to any baseless and malicious litigation or prosecution, whether criminal or civil. The criminal defendant or civil respondent in a baseless and malicious case may later file this claim in civil court against the parties who took an active role in initiating or encouraging the original case. The defendant in the initial case becomes the plaintiff in the malicious prosecution suit, and the plaintiff or prosecutor in the original case becomes the defendant. In most states the claim must be filed within a year after the end of the original case. 

Malicious Prosecution is a common law intentional tort, while like the tort of abuse of process, its elements include (1) intentionally (and maliciously) instituting and pursuing (or causing to be instituted or pursued) a legal action (civil or criminal) that is (2) brought without probable cause and (3) dismissed in favor of the victim of the malicious prosecution. In some jurisdictions, the term "malicious prosecution" denotes the wrongful initiation of criminal proceedings, while the term "malicious use of process" denotes the wrongful initiation of civil proceedings.  

When Criminal Charges Cannot be Filed Against a Targeted Victim, another Standard Operating Procedure is Utilized called 

PSYCHIATRIC REPRISAL or POLITICAL ABUSE OF PSYCHIATRY - 

Political abuse of psychiatry is the misuse of psychiatric diagnosis, detention and treatment for the purposes of obstructing the fundamental human rights of certain groups and individuals in a society.[1][2]:491 In other words, abuse of psychiatry including one for political purposes is deliberate action of getting citizens certified, who, because of their mental condition, need neither psychiatric restraint nor psychiatric treatment

 IN EITHER CASE - IT IS UTILIZED TO GET THE TARGETED VICTIM LABELED, IN ORDER TO NEUTRALIZE and/or SILENCE THEM - 

In the case of Targeted Individual who are Blacklisted/Targeted - because there is generally nothing Criminal that can be Utilized Against the Target, they will go about Orchestrating Situations that Will Compromise the Target, in order to Get them In Trouble, and/or Labeled

Why is the above Photo and Article Relevant other than it Visually Shows how Innocent People are Set UP by Abuse of Power and Malicious Prosecution is because I am going to Outline the Same Standard Operating Procedure that is Utilized in a Conspiracy Against the Rights of Targeted Victims':  

I recently received the Los Angeles Police Report about a Call I made due to a Resident by the name of Michael Hassan, who has repeatedly harassed, ridiculed, and physically assaulted me. 

 

Upon reading over the Los Angeles Police Report, I noticed that (3) Anonymous Residents showed up without my knowledge to speak to LAPD Officer Kong (32667), who went over to speak to the Assailant Michael who was in the front area, and out of my view, while I was being interviewed by LAPD Officer Hagaman (41207)  during my call to them about the physical assault sustained by this resident.   

 

In order to Cover Up the Assault and Physical Violence inflicted against me by this Resident Provocateur and Perp, (3) Residents' came out of nowhere, without my knowledge and Chose to Anonymously Slander me to LAPD Officer Kong, who then later placed these highly inflammatory, and slanderous statement by these Anonymous Resident's upon an Official Los Angeles Police Report.  It is also being used in order to Establish Paperwork, and Paper Trail of Inflammatory Negative Information in the Hopes of Utilizing it as a Weapon Against.  

Here are THEIR problems - I am fully documented since the Go Live Blitzing of Targeting in 2006 - I Have detailed and outlined Their Malicious Tactical Operations.  When there was Nothing in 2006 - They set about Finding, and/or with Premeditated Malicious Intent  Orchestrating SET UPs in order to Compromise and/or Get me Labeled in some fashion -

In addition, there was Before Targeting which covers 43 and a Half Years of Established Life without major incidents - and After Go Live Targeting and Constant Set Ups - That is why at any time I will take Before Targeting and my 43 years of Life - Against what they CONTINUE to seek to Set Up and Establish in order to use it against me. 

But we are in the year 2014 - I am still Standing, Just barely - After that many Years - YOU WOULD THINK PEOPLE WITH EVEN HALF A BRAIN - could FIGURE OUT - There is NOTHING - Other than what those who have Abused their Positions of Power - CONTINUE TO GENERATE, ORCHESTRATE, AND SET UP -  Not because I am Guilty of Anything other than being the VICTIM of MALICIOUS FORMS OF PROSECUTION - VIA ABUSE OF PROCESS AND POWER

 The above image is the PERFECT EXAMPLE of 

STANDARD OPERATING PROCEDURES


1. Established procedure to be followed in carrying out a given operation or in a given situation.
2. A specific procedure or set of procedures so established.

by this Corrupted State, Corporate, Academia, Sponsored, Sanctioned, and Covered Up - 

  Crimes that are being committed by them and on the Street Level by their Vast Network of Civilian Sleeper Cells - who are committing felonies, assault, theft, vandalism, stalking, harassment, aka California Street Terrorism Enforcement and Prevention Act Tactics - and in some cases murder against Blacklisted Targeted Individuals.  

 

It is a way to REVERSE ENGINEERING and COVERING UP the TRUE CRIMES being COMMITTED by the True Culprit/s - by placing the Burden and Blame upon and against the Actual Victim/s.  

 

There is also something else that may be going on, and it has to do with who the Real Control Group of Experimentee's truly are?  For those Target's who do not do it for Money, or Coercion/blackmail or Ego - There is a huge segment of the Perp Community who do it for Ideological/Cause Driven Reasons - 

 

1. False Flag Operations and Negative Narrative Driven Propaganda (Cause/Ideologically Driven)

 

2. Various Neurotechnological Manipulations in particular to intensify negative feelings against Targeted Individual / Victim.

 

Right temporoparietal junction

The right temporoparietal junction (rTPJ) is involved in the processing of information in terms of the ability of an individual to pay attention. Evidence from neuroimaging studies as well as lesion studies revealed that the rTPJ plays a pivotal role in analyzing signals from self-produced actions as well as with signals from the external environment.

 That has been proven through Magnetic Stimulation i.e. Sending a Magnetic Pulse or Light Source through the human skull into specific targeted Brain Regions in order to Activate and/or Deactivate that region of the brain to deliberately Alter the functions of that region of the brain. 

2009 TED TALK: REBECCA SAXE: HOW WE READ EACH OTHERS MINDS

 


HERE IS ANOTHER SAMPLE OF TRANSCRANIAL MAGNETIC STIMULATION to DELIBERATELY INTERFERE WITH SIGHT, MOTOR SKILLS, NUMBERS, SPEECH - ETC.