{"id":132,"date":"2018-12-27T00:52:35","date_gmt":"2018-12-26T23:52:35","guid":{"rendered":"https:\/\/irmaetos.org\/?page_id=132"},"modified":"2024-03-03T20:47:25","modified_gmt":"2024-03-03T19:47:25","slug":"synopsis-of-organized-stalking-electronic-harassment-and-electronic-torture","status":"publish","type":"page","link":"https:\/\/icator.be\/synopsis-of-organized-stalking-electronic-harassment-and-electronic-torture\/","title":{"rendered":"Synopsis of Cyber Torture"},"content":{"rendered":"\n
<\/div>\n\n\n\n

In recent years, this torturous, technological crime has been receiving wide media coverage.  The media have reported the effects of what is now called the \u201cHavana Syndrome,\u201d since the first cases originated in Havana, Cuba.<\/p>\n\n\n\n

When the name \u201cHavana Syndrome\u201d was first reported, over 2,000 diplomats and security agency staff, mainly from the USA and Canada, stated that strange and very distressing symptoms were happening in and on their bodies. These symptoms were not new. They had already been occurring for decades, in over 21 other countries, under different names: V2K (Voice to Skull) technology and DEW (Directed Energy Weapons) technology.<\/p>\n\n\n\n

These technologies are a global targeting program, centred around human experimentation of the brain, control over a person, and the advancement of A. I. (Artificial Intelligence).<\/p>\n\n\n\n

Below is a brief outline of the aspects involved as part of the development of cyber torture of victims.<\/p>\n\n\n\n

<\/div>\n\n\n\n

Organised Stalking or \u2013 \u201cGang Stalking\u201d <\/strong><\/h2>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

Organised stalking, commonly known as \u201cGang Stalking,\u201d is carried out by enthusiastic, structured groups. Some are civilians who are approached, and are paid, to carry out the development of these technologies and to monitor their victims daily.<\/p>\n\n\n\n

During and after WW2 the German Police, named \u201cThe Stasi,\u201d were surveiling civilians during much public unrest. Initially, the tactics used were severe. Eventually, \u201cno-touch torture\u201d was introduced, intended to intimidate, and psychologically weaken the target. It was called \u201cZersetzung\u201d. <\/em>It has been investigated and found that the Stasi used X-ray devices in a directed and weaponised manner to cause long-term health problems in its opponents.<\/p>\n\n\n\n

In 1956 in the U.S.A., the FBI began \u201cCOINTELPRO\u201d\u2014short for Counterintelligence Program.  The U.S. Government claimed this was set up to infiltrate and stop groups, such as the Ku Klux Klan. They publicly ceased Cointelpro in the 70\u2019s but secretly continued and today it is still operational.<\/p>\n\n\n\n

Victims are followed, intimidated, sabotaged, and isolated. It is often the case that victims will experience the same people monitoring them. Breaking and entering the victim\u2019s home is common and is highly reported. This is done to plant covert monitoring devices and to follow every move of the victim.<\/p>\n\n\n\n

Victims often hire private detectives, once they realise, they are being monitored. They then find that their stalkers are hired by, or working for the Government, agencies, and police. The stalkers have clearances and access to all the victim\u2019s emails and accounts.<\/p>\n\n\n\n

Through V2K technology, where subliminal messages and thoughts are transmitted into a victim, \u201cStreet Theatre\u201d can take place. The victim is fed information that certain people are involved in their monitoring and that they are being followed everywhere.<\/p>\n\n\n\n

<\/div>\n\n\n\n

Electronic Harassment <\/strong><\/h2>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

Another aspect is hacking and cyber stalking. Any passwords, accounts including social media accounts, emails and even banking accounts can easily be monitored and sabotaged. Some report that loans are taken out in their names, illegally.<\/p>\n\n\n\n

It is well known that victims end up having to be vigilant and back up important files in ways which they should not have to do.<\/p>\n\n\n\n

Due to their high-level clearances, and advanced hacking and monitoring capabilities, the criminals involved can usually achieve their goals without being traced. We also know that various Intelligence agencies around the world monitor people Illegally. The N.S.A. monitor people all over the world and keep records of all communications.<\/p>\n\n\n\n

Part of the evidence the victim has is that hacking can be detected and proven. By using IP addresses and network monitoring Apps and software, an individual can see if others are using the victim\u2019s personal networks & IP addresses.<\/p>\n\n\n\n

<\/div>\n\n\n\n

Electronic Attacks <\/strong>– Nervous system manipulation<\/strong><\/h2>\n\n\n\n
\n
\n
\"\"<\/figure>\n<\/div>\n\n\n\n
\n
\"\"<\/figure>\n<\/div>\n\n\n\n
\n
\"\"<\/figure>\n<\/div>\n<\/div>\n\n\n\n

Using highly advanced Microwave Weapons Systems, which can come in many different forms, victims can be attacked via manipulation of the Central Nervous System. Signals are sent to the Spinal cord using Tone Generators. Each vertebrae have a different tone \u2013 these are referred to as \u201cSong of the Spine\u201d.<\/p>\n\n\n\n

Signals are sent, which are then translated by the brain and the victim experiences actual physical pain, as a result. The attacks are real and damaging on the skin and other internal areas of the body.<\/p>\n\n\n\n

There are only few types of RF or microwave signals which can operate in such a way to penetrate multiple obstacles, such as buildings and walls. These signals also work when a person is underwater and on a plane. The fact the attacks do not stop whilst travelling on a plane, and once the victim is in a foreign country, proves that satellites are being used.<\/p>\n\n\n\n

When a person moves to a remote location, attackers can often use drones which provide recalibration to different satellites. There are satellites in orbit just for the purpose of remote areas. The fact that satellites are being used tells us that telecommunication companies either know about these transmissions or are involved. In many cases, satellites used for the public do not reach areas that military satellites can.<\/p>\n\n\n\n

Devices such as mobile phones, tablets, laptops and more can be accessed and hacked into, via signals, for them to transmit back from satellite or 5G towers, directly into the victim. This is an easy method used to attack victims.<\/p>\n\n\n\n

Companies making such devices and weapons are DARPA \/ Lockheed Martin \/ Boeing \/ NASA and many more. DARPA have their own Brain Initiative program. There is also now the AG Barr Pre-Crime program.<\/p>\n\n\n\n

The transmissions are very specific and have pinpoint precision. DEW (Directed Energy Weapons), transmit massive electrical shocks and waves \/pulses or energy which leave severe radiation burns on the victims\u2019 skin. DEW and lasers are all being used by militaries around the world.<\/p>\n\n\n\n

Victims will usually find they have high toxic chemicals and metals in their systems because of the severe radiation exposure. Symptoms can lead to serious health conditions such as Auto Immune disorders and cancer.<\/p>\n\n\n\n

<\/div>\n\n\n\n

BCI & RNM \u2013 Brain Computor Interface & Remote Neural Monitoring <\/strong><\/h2>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

The innocent victim has also provided research and medical technologies which are used in a positive way. Examples are Parkinson\u2019s Disease and Dementia. This is known as DBS \u2013 Deep Brain Stimulation. A patient will CONSENT to an Implant in their brain and a BCI for doctors to aid in their treatment.<\/p>\n\n\n\n

These technologies are being used by Elon Musk and companies such as NEXTMIND. Headsets have been developed which allow a person to control their devices, via their thoughts, i.e., without having to touch the devices.<\/p>\n\n\n\n

For the victims of V2K technology and DEW, NON-CONSENSUAL<\/strong> implants and\/or chips cause serious neurological damage such as seizures, cognition issues, emotional, visual, memory loss, basic body movements, nausea, dizziness, balance, and speech issues. It allows the criminal access to, and control over, every part of the victim\u2019s brain. This is known as Remote Neural Monitoring. Essentially, this provides attackers control over the life of a person.<\/p>\n\n\n\n

<\/div>\n\n\n\n

Voice to Skull \u2013 V2K \u2013 Subliminal Messaging <\/strong>– “The Frey Effect”<\/strong><\/h2>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

Most victims complain of symptoms commonly referred to as \u201cVoices\u201d. When experiencing this for the first time it can be extremely distressing. Doctors pass the victim off as schizophrenic, however schizophrenia happens to people in their 20\u2019s and not in their 30\u2019s, 40\u2019s, 50\u2019s and beyond. The voices are in real time and the criminals can comment or transmit thoughts, via computer transmission, within nano seconds.<\/p>\n\n\n\n

The criminals use what are known as \u201cVox Changers\u201d, into the cochlea, to disguise voices and to make the experience more disturbing. The disguise is computer-generated most of the time They can, for example, emulate the voice of a family member of the victim and transmit images of that family member into the victim\u2019s brain. This may make the victim believe that even his\/her loved ones may be involved in the crime.<\/p>\n\n\n\n

.<\/p>\n\n\n\n

<\/div>\n\n\n\n

Implants or RFID Chips, Hydrogel Sensors, Nano-Tech <\/strong><\/h2>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

The attacks can be achieved simply by the victim receiving EMF transmissions. Usually, victims have been implanted with some form of chip or chips, within their bodies. Implanted. Non-con-sensually and Illegally.<\/p>\n\n\n\n

When victims become aware of their attacks, they think back to any surgical procedure they have had. In many cases, doctors, surgeons, and scientists have been paid \u2018under the table\u2019 to implant victims. National Health care services can be paid to involve themselves in these so-called \u2018research programs. The implanting may have also been performed just after the victim\u2019s birth.<\/p>\n\n\n\n

Over the years, these chips or Implants have become more and more advanced. Hydrogel sensors have been used for medical research. They can be injected, rubbed onto the skin or even put into a drink.<\/p>\n\n\n\n

Hydrogels thrive in water and expand in the bloodstream. Nano Technology is also often referred as \u201cSmart Dust\u201d. It is used in food packaging, the growing of crops, medical gauzes and more. Once in the system, they can never be removed.<\/p>\n\n\n\n

Some chips can be easily moved around the victim\u2019s body in order that attacks can be made to different areas.<\/p>\n\n\n\n

Some can be injected, or actual surgery is required. Some victims report break ins to their home and marks appearing on their bodies the next day.<\/p>\n\n\n\n

Some consumers are nowadays choosing to have RFID chips implanted into various body parts. There are many companies around the world offering this technology. These consumers have chips implanted into their hands so that they can, for example, make payments, open doors, start their cars because the RFID chip\u2019s signal provides this option instead of the person using a card or a key.<\/p>\n\n\n\n

Dr Staninger is a toxicologist who has written a book about implants – <\/p>\n\n\n\n

https:\/\/www.awesomebooks.com\/book\/9781498492003\/global-brain-chip-and-mesogens?gad_source=1&gclid=CjwKCAiA3JCvBhA8EiwA4kujZiiTnlkq88mFqF5D373AJh57nODPI3Tg6NUYeugzXaLOEOFE-AO64xoC2dQQAvD_BwE<\/a><\/p>\n\n\n\n

<\/div>\n\n\n\n

Conclusion <\/strong><\/h2>\n\n\n\n

History has shown that because patients are not aware of what unscrupulous doctors, scientists and surgeons will do, to make extra money\/monies, they become victims of illegal research and greed. This is murder and a war crime. Many victims have been murdered because of inhumane treatment and torture, be it the result of brain or nerve damage or radiation exposure, via V2K technology and\/or microwave waves (EMF). Victims have submitted to diseases, cancer and in many cases have committed suicide.<\/p>\n\n\n\n

Please see our \u201cDocuments\u201d page to view various patents for these patents and technologies.<\/p>\n\n\n\n

<\/p>\n\n\n\n

<\/p>\n\n\n\n

<\/p>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

In recent years, this torturous, technological crime has been receiving wide media coverage.  The media have reported the effects of what is now called the \u201cHavana Syndrome,\u201d since the first cases originated in Havana, Cuba. When the name \u201cHavana Syndrome\u201d was first reported, over 2,000 diplomats and security agency staff, mainly from the USA and Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/pages\/132"}],"collection":[{"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/comments?post=132"}],"version-history":[{"count":42,"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/pages\/132\/revisions"}],"predecessor-version":[{"id":2437,"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/pages\/132\/revisions\/2437"}],"wp:attachment":[{"href":"https:\/\/icator.be\/wp-json\/wp\/v2\/media?parent=132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}