TARGETED INDIVIDUALS: The Various Means of Attack, Abuse and Assault – The Millennium Report
TARGETED INDIVIDUALS: The Various Means of Attack, Abuse and Assault – The Millennium Report TARGETED INDIVIDUALS: The Various Means of Attack, Abuse and Assault The Millennium Report December 22, 2018 Post navigation ←→ Search Search for: Recent Posts Catastrophic Covid Vax Mandates Shutting Down Hospitals, Medical Centers and Healthcare Systems Like This?! Get Ready For The First Pluto Return in American History The Global Power Structure Behind OPERATION COVID-19 & COVID KILL SHOT Exposes Itself Here’s the Covid Game Plan for Global Genocide and Enslavement of Humanity HARD DATA PROVES BIG PHARMA KNEW COVID VACCINES WOULD WORSEN AND PROLONG THE PANDEMIC OPERATION JAB INDIA: A Slow Motion Genocide JOHN POULOS: LIAR-IN-CHIEF FOR DOMINION VOTING SYSTEMS BIG Reveal About Covid ‘Vaccines’! THE COVID-19 EXTINCTION LEVEL EVENT MEDICIDE: How American Hospitals and Doctors Methodically Murdered Covid Patients OPERATION COVID-19 VARIANT & THE PERPETUAL PANDEMIC HOAX THE POWER ELITE HAVE GONE COMPLETELY MAD! THE GREAT COVID-19 VACCINE CRIMINAL COVER-UP OPERATION SUEZ SHUTDOWN: A Global Psyop With Multiple Nefarious NWO Ambitions The GREAT GUN GRAB of 2021 Begins! BRITISH RIOT PHOTOS: The Brits Finally Begin to Take Back Their Power—BIG TIME! List of Mass Shootings in the United States in 2021 “ZOMBIE APOCALYPSE”! Brought to you by the CDC DR. FAUCI & THE FAST-EMERGING FOURTH REICH THE GREATEST HOPE PORN PSYOP IN WORLD HISTORY GLOBAL COVID VACCINE PSYOP DESIGNED TO DECEIVE HUMANITY INTO TRANSHUMANISM AND WORSE The Barbarians Are Inside The Gate The Fake ‘GREAT RESET’ & The End Of Civilization As We Know It A Very Smart Rabbi States 31 Reasons Why He Will NEVER Receive a COVID-19 Vaccine OPERATION DEEP FREEZE: A Manmade Weather Attack & Infrastructure Assault Targeting Every Texan Pocketbook Archives September 2021 July 2021 June 2021 May 2021 April 2021 March 2021 February 2021 January 2021 December 2020 November 2020 October 2020 September 2020 August 2020 July 2020 June 2020 May 2020 April 2020 March 2020 February 2020 January 2020 December 2019 November 2019 October 2019 September 2019 August 2019 July 2019 June 2019 May 2019 April 2019 March 2019 February 2019 January 2019 December 2018 November 2018 October 2018 September 2018 August 2018 July 2018 June 2018 May 2018 April 2018 March 2018 February 2018 January 2018 December 2017 November 2017 October 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 March 2017 February 2017 January 2017 December 2016 November 2016 October 2016 September 2016 August 2016 July 2016 June 2016 May 2016 April 2016 March 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 May 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 Categories Featured Posts Uncategorized Meta Log in Entries feed Comments feed WordPress.org Skip to content HOME TODAY’s POSTS TWITTER Featured Posts PURPOSE CONTACT TMR LIBRARY 5G ROLL-OUT Pedogate & Pizzagate NUCLEAR RADIATION UPDATES PRIVACY CLICK ☰ FOR RECENT POSTS, SEARCH & ARCHIVES → TARGETED INDIVIDUALS: The Various Means of Attack, Abuse and Assault FacebookTwitterPinterestRedditEmailShare TARGETED INDIVIDUALS: The Various Means of Attack, Abuse and Assault Tactics (Part 1) It has been said that when you’re first targeted, they hit you hard in multiple directions. Presumably, this is done so you’ll collapse after experiencing recurrent emotional violence, which is compounded after you’ve realized that all normal support structures and avenues of grievance have been removed. There appears to be multiple levels of intensity of this program that people can receive. The two main parts of the program are group stalking and Non-lethal Weapons (NLW). Both are violent attacks. And some are apparently hit hard with both. People tend to associate the word harassment with acts of temporary aggravation or pestering. Therefore, it may not by the proper word to describe the never-ending acts of covert violence inflicted upon targeted people, which amounts to torture and murder. Some of the tactics used in these programs are borderline-subliminal, which is why they are so difficult to detect, explain, and defend against. It is my goal to make the unconscious, conscious. Many of these tactics are a type of mind-control. Most of these tactics have been used in former Cointelpro operations by the United States, Russia, and Germany against their civilian population. The Hidden Evil’s genesis is obviously derived from known tactics such as bogus investigations, surveillance, smear campaigns, the use of noise, thefts, break-ins, character assassination, staged accidents, framings, sabotage and vandalism, mail interference, blacklisting, citizen informant squads for overt surveillance (Gang Stalking), poisoning and drugging, incarceration into prisons and mental institutions, and electromagnetic weaponry. It is a historical fact that the U.S. has officially targeted its civilian population on multiple occasions. Programs such as MKULTRA and Cointelpro can’t be denied. “The methods reportedly employed in these harassment campaigns,” explained McKinney, “bear a striking resemblance to those attributed to the CIA and FBI during Operations MKULTRA, MHCHAOS, and COINTELPRO.” In Germany these methods were contained in two programs, Zersetzung and Directive Perceptions. They were basically German versions of Cointelpro. Zersetzung was developed to destroy a targeted person’s inner-self. During an interview on the Republic Broadcasting Network, Dr. Munzert, a German target, drew a parallel between the current program, and what occurred in East Germany. He explains, “In Germany this is called Zersetzung and this means the dissolution or disintegration of the targeted person.” BBC in 2004 for her non-fiction book, Stasiland. In it, she wrote, “The German word Zersetzung is harsh, and has no direct English equivalent.” She described, “Zersetzung, as a concept, involves the annihilation of the inner-self.” It calls for, “[The] targeted spreading of rumours about particular persons with the aid of anonymous [means]… making compromising situations for them by creating confusion over the facts… [and] the engendering of hysterical and depressive behaviors in the target person.” “Directive Perceptions,” she continued, was another program designed to “develop apathy (in the [targeted] subject)… to achieve a situation in which his conflicts, whether of a social, personal, career, health or political kind are irreversible… to give rise to fears in him… to develop/create disappointments… to restrict his talents or capabilities… to reduce his capacity to act and… to harness dissentions and contradictions around him…” These directives were used by the Ministry for State Security (MfS) against threats to state security. In other words, they were massively used on the population to maintain a dictatorship. These programs were designed to secretly destroy a target’s personal and professional life, ruin them financially, and prevent them from reaching their potential, with the intention to produce irreversible depressive and panic-stricken behaviors. What the Hidden Evil appears to be, is a combination of various Cointelpro operations used by oppressive regimes on their civilian population. It has been refined and deployed globally. As I’ll demonstrate, it is likely an indication of the creation of a worldwide dictatorship. Hidden in Plain View Many of us have experience with books where the goal is to find the hidden picture contained in the landscape. Or the artwork, where if you look intently, you will eventually see a three-dimensional picture superimposed on a flat background. At first, most of us had some trouble detecting these hidden pictures, but with practice we usually see them. Once the detection mechanism is developed, these hidden objects become clearly visible with little effort. So too with the Hidden Evil. Once you know what to look for, these borderline-subliminal attacks are quite detectable.(*) So, rather than using a blunt overt attack against a fully functional person, they usually attack covertly, and conceal their harassment by using existing events that occurs naturally. There is usually cover for the harassment as well. However, it is probably a statistical rarity for some of these staged events to occur as often as they do. They conceal much of their harassment using what appears to be a simple formula. From what I’ve learned, the basic formula is as follows: Frequency: Describes how often an event occurs. It also pertains to the number of acts within a single event. Duration: Pertains to the length of a single event. It also pertains to the non-stop nature of the harassment in general. Intensity: The amplification of acts such as sound, sight, crowding, etc. within an event. A hypothetical example of a car door-slamming event would include this: One neighbor arrives and two others leave. As they’re tending to their vehicles there is the repeated opening and shutting doors and trunks, alarms going off, and beeping from alarms being turned on. These disturbances emanate from areas surrounding your house. This may happen simultaneously, or they may be strung together, one right after the other. Synopsis The event lasted for 5 minutes; longer than normal (Duration). In addition to length of the event being extended, the number of times each act occurred within the event was increased (Frequency). Ex: Multiple, repeated doors/trunk slamming from cars, even if a single individual is at the vehicle. This event also happens many times throughout the day (Frequency). Each individual act of door/trunk shutting is amplified by deliberate slamming to produce a louder than normal noise (Intensity). The event was louder, contained more activity (acts), and lasted longer than normal to produce a covert attack. Even if a single individual is arriving/leaving, standard practice seems to be multiple slams (trunk, back door, driver’s door). This may be synchronized with your activity, such as your arrival or departure. The event may also be a part of a Noise Campaign consisting of an alteration of other types of noise. This basic formula is used with many of the tactics outlined in this chapter. The frequency and duration formula is also used in Mobbing. In addition to the overuse of an individual tactic, these tactics are combined and used in a round-the-clock fashion, which amplifies their overall potency. Basic Protocol There is a basic protocol that they begin with which is consistent in all NATO nations. It begins with the surveillance of targets, monitoring of their private lives, and entry into their homes (break-ins). This is done so their personality traits can be cataloged. “There is a basic protocol that the perpetrators begin with,” states McKinney, “but the TI [Targeted Individual] contributes to the modification.” After they are singled out for preliminary stages of harassment, Gang Stalking ensues, which McKinney describes as part of a “softening-up process.” After a period of overt surveillance (Gang Stalking), NLW are introduced. The NLW harassment gradually increases to extreme conditions. This pattern has unfolded consistently in all NATO countries. Dr. Munzert speaks of basically the same pattern, which he describes as a “double-folded strategy.” “It is usually the same procedure,” he announced, “but with individual variations.” One part includes the victims being “attacked with microwave weapons,” and “the other part of the strategy” he says, is to portray the targeted people as “mad [insane].” He explained the effectiveness of this approach as “unbeatable,” and reveals that this is essentially what the Stasi did to their targets. Part of this protocol appears to include elements of Neuro-linguistic Programming (NLP), which is a type of mind-control used by behaviorists to affect change. NLP will be covered in more detail shortly. Some of the tactics below have been called Street Theatre, Harassment Skits, or Staged Events. They are planned harassment skits, such as blocking, or swarming. They also include informants who surround targets and have conversations intended to be overheard, which contain information about the target’s personal life. Presumably, citizen informants are told that this is necessary to let targeted people know they’re being watched. This may happen in any public place. This is not a complete list of tactics but it includes some of the more common ones reported. Some of these tactics will sound insane because they’re deliberately designed to make someone appear as though they’re suffering from a mental disorder. They were definitely created by experts in the behavioral sciences. In addition, people may be emotionally drained, and unable to properly identify or explain what’s happening to them. According to the DOJ, mental tactics designed to cause psychological harm must last for months or years before they constitute torture. The Hidden Evil fits this description. So keep in mind, these are Psychological Warfare tactics which are intended to drive people crazy. Mental Health System The mental health system is apparently being used worldwide to discredit targeted people who complain. According to the book, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, countries around the world, including the U.S., have used doctors to help abuse and discredit people, often for political reasons. It is also a documented fact that there was collaboration between doctors and the military when experiments were carried out in prisons, hospitals, and universities on unwitting people in North America. McKinney states that medical doctors, as well as psychiatrist and psychologists appear to be providing cover for this program. This is similar to what was done in Russia, where enemies of the dictatorship would be thrown into mental institutions and drugged beyond recovery. “The APA’s refusal to acknowledge the impact of terrorization upon the human psyche, even given the publicity stemming from the Church Committee’s findings in 1975, raises serious questions about the validity of psychiatry as a profession in this country,” declared McKinney, “not to mention, the APA’s ethical intent, in the long term.” The DSM is a diagnostic manual for identifying mental disorders. The first edition of the DSM was released in 1952 at a time when the APA was under the control of Dr. Ewen Cameron, who would commit brutal government-sponsored torture under the MKULTRA program. Dr. Rauni Leena Kilde, former Chief Medical Officer of Finland, wrote an article entitled, Microwave Mind Control: Modern Torture and Control Mechanisms Eliminating Human Rights and Privacy. In it she described, “The Psychiatric Diagnostic Statistical Manual (DSM) for mental disorders,” as a “brilliant cover up operation in 18 languages to hide the atrocities of military and intelligence agencies’ actions towards their targets.” Dr. Kilde says the manual, “lists all mind control actions as signs of paranoid schizophrenia,” and that “all medical schools teach their students that the person is paranoid, ESPECIALLY if he believes intelligence agencies are behind it all.” Finally she proclaims, “Never is the medical profession told that these are routine actions all over the world by intelligence agencies against their targets.” Dr. Munzert said that doctors, “first think of paranoia and schizophrenia” if someone complains of this program. He cautions that because of this, “victims” could end up in a “lunatic asylum.” Annie Earle, a Licensed Clinical Social Worker, and Board Certified Diplomat in her area of expertise, has over 25 years of psychotherapy experience as an independent practitioner. When referring to the DSM during an interview on the Republic Broadcasting Network, she stated, “It’s called the Diagnostic Statistical Manual… [and all] psychotherapists, regardless of specialty are required to give their patients a diagnosis from this manual, and in order to get the diagnosis you have to fulfill certain criteria that is clearly spelled out in the DSM.” Earle noticed a pattern unfolding when some of the people who came to her who did not fit the standard criteria. “The patients that started coming to me really did not fit any of the standard classifications,” she explained. “For example, they might be having what some people consider a psychotic or schizophrenic breakdown in that they might report what seem to be hallucinations, but they did not have any of the other criteria that goes along with schizophrenia. There are many criteria that one is required to… [detect] in making the diagnosis of schizophrenia, and these people did not meet all that criteria.” Apparently Earle became targeted herself while studying this program. Interestingly, the April/May 1996 issue of Nexus Magazine contained an article entitled, How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM) written by former NSA worker John St. Clair Akwei. It read, “NSA DOMINT [Domestic Intelligence] has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.” The DSM appears to have been created with a loophole which allows government-sponsored harassment programs to exist. This was evidently done so that people will appear ill when explaining this to a mental health professional. Adding to this confusion, the program itself is designed to mimic mental illness when explained to those “not-in-the-know.” Mental health professionals may also participate in this program, wittingly or unwittingly by labeling targets as mentally ill. It is one of several layers of protection used to help keep this program operating in secrecy. It’s easy to see how some mental health professionals might “jump to conclusions.” Surveillance Surveillance is apparently part of an ongoing bogus investigation that never ends. The investigation may be done for reasons of “national security.” Similarly, German and Russian security forces would often target the civilian population for the same reason. After a person is singled out, dwellings surrounding the target will be sublet and used as bases of operation and training. If the target lives in a house, the base will usually be the closest building to the house. If the target lives in an apartment, then the base will be in one or more of the surrounding apartments. There will be unusual patterns of occupancy with lots of people coming and going into these bases. Vehicles and license plates used by the occupants of the bases may be periodically changed. According to McKinney and Moret, the people who move into these bases have been linked to the DOJ, CIA, and other federal agencies, as well as Universities, and government defense contractors. “In order to target someone it requires that that person be put under surveillance,” proclaimed McKinney, “so that their personality traits, their capacity to inter-relate with people, their capacity for corruption or non-corruption (that seems to be a critical point), and even their religion factors into it.” The information obtained by surveillance is used for no ethical reason, “other than to establish a harassment protocol, which will follow that targeted individual for the rest of his or her life,” said McKinney. Moret said that neighbors, friends and family are then co-opted into the harassment. This surveillance is apparently done using very sophisticated equipment which can locate targeted people through walls. This equipment seems to be used in combination with Directed Energy Weapons and other “Non-lethals.” According to McKinney, miniature microphones and cameras may… truncated (43,156 more characters in archive)