• Home
  • ABOUT
    • DONATE
    • Board & Advisory Board
    • Officers
    • MEMBERSHIP APPLICATION
    • PODCASTS
    • FINANCIALS
  • NEWS
    • LATEST NEWS
    • WHAT IS A TI?
    • CIA/MK ULTRA
    • TREASON AT SCHRIEVER
    • TIMELINE
    • CORPORATIONS
  • RESOURCES
    • NEW TIs
    • GANGSTALKING
    • KEY EVIDENCE
    • V2K
    • SHIELDING
    • Deutsch
  • MEDICAL
    • DR. LEN BER
    • qEEG
    • MICROWAVE BURNS
    • IMPLANTS
    • MORGELLONS AND NANITES
  • ACTIVISM
    • Digital Warriors
    • TJinDC
    • HOW TO FIGHT BACK
    • FLYERS
    • Presentation: CIA Program
    • TARGETED ACTION
  • LEGAL
    • PROJECT FREEDOM
    • Lawsuits
    • Legal Information
  • More
    • Home
    • ABOUT
      • DONATE
      • Board & Advisory Board
      • Officers
      • MEMBERSHIP APPLICATION
      • PODCASTS
      • FINANCIALS
    • NEWS
      • LATEST NEWS
      • WHAT IS A TI?
      • CIA/MK ULTRA
      • TREASON AT SCHRIEVER
      • TIMELINE
      • CORPORATIONS
    • RESOURCES
      • NEW TIs
      • GANGSTALKING
      • KEY EVIDENCE
      • V2K
      • SHIELDING
      • Deutsch
    • MEDICAL
      • DR. LEN BER
      • qEEG
      • MICROWAVE BURNS
      • IMPLANTS
      • MORGELLONS AND NANITES
    • ACTIVISM
      • Digital Warriors
      • TJinDC
      • HOW TO FIGHT BACK
      • FLYERS
      • Presentation: CIA Program
      • TARGETED ACTION
    • LEGAL
      • PROJECT FREEDOM
      • Lawsuits
      • Legal Information
  • Home
  • ABOUT
    • DONATE
    • Board & Advisory Board
    • Officers
    • MEMBERSHIP APPLICATION
    • PODCASTS
    • FINANCIALS
  • NEWS
    • LATEST NEWS
    • WHAT IS A TI?
    • CIA/MK ULTRA
    • TREASON AT SCHRIEVER
    • TIMELINE
    • CORPORATIONS
  • RESOURCES
    • NEW TIs
    • GANGSTALKING
    • KEY EVIDENCE
    • V2K
    • SHIELDING
    • Deutsch
  • MEDICAL
    • DR. LEN BER
    • qEEG
    • MICROWAVE BURNS
    • IMPLANTS
    • MORGELLONS AND NANITES
  • ACTIVISM
    • Digital Warriors
    • TJinDC
    • HOW TO FIGHT BACK
    • FLYERS
    • Presentation: CIA Program
    • TARGETED ACTION
  • LEGAL
    • PROJECT FREEDOM
    • Lawsuits
    • Legal Information

GANGSTALKING

“Spread disinformation, spurn fairness, or even violate their oaths of office for political and personal gain, all at the expense of equal justice and American national security." - Kash Patel

TARGETED JUSTICE IN THE NEWS

Gateway Pundit article on Targeted Justice's letter to Sec. Kristi Noem

DHS FUNDS THE ILLEGAL GANSTALKING PROGRAM

The Gateway Pundit published Targeted Justice's letter to Kristi Noem requesting that she eliminate fraud, waste, and abuse from the Department of Homeland Security by eliminating the illegal gangstalking program. Access the article HERE. 

ORGANIZED HARASSMENT: GANGSTALKING

FBI and DHS: Sponsors and Coordinators of Gangstalking

 WHAT IS GANGSTALKING?
These are definitions provided by a Large Language Model (LLM). 


What is “gang stalking”?


Gang stalking refers to the coordinated effort by a group of individuals to systematically harass, intimidate, and damage the reputation of a target. This can involve spreading false rumors, isolating the person from their community, and manipulating others to turn against them.


Workplace mobbing is a more specific term, often used when this kind of behavior happens in a professional setting. It's a situation where a person is targeted by colleagues or higher-ups who engage in behavior to undermine their credibility, spread lies, and ostracize them.


The term "gangstalking" (sometimes spelled as "gang stacking") refers to a coordinated effort by a group of people to harass, intimidate, and psychologically destabilize an individual, often called the "targeted individual" (TI). This behavior can take many forms, including spreading rumors, surveillance, and social isolation. It’s essentially a collective, deliberate effort to undermine the person’s life through various means, both in public and private spaces.


Here’s a more detailed breakdown of what gangstalking typically involves:


Common Tactics in Gangstalking:


1. Surveillance: The targeted individual is constantly watched or followed by the group, whether it’s through physical presence, surveillance equipment, or other methods.


2. Spreading False Information: Rumors or lies are spread about the targeted individual to damage their reputation and make them appear unstable, untrustworthy, or dangerous to others.


3. Social Isolation: The targeted individual is isolated by making others distrust them. This can involve reaching out to the target’s friends, family, co-workers, or neighbors to manipulate them into turning against the person.


4. Psychological Manipulation: Harassment and mental tactics, such as gaslighting (making someone doubt their own reality), are employed to cause the target to question their own perception and sanity.


5. Stalking and Harassment: This could be direct, where the individual is followed or confronted in person, or indirect, where the target’s every move is subtly manipulated through subtle cues and hints.


6. Public Humiliation: The group may engage in actions that embarrass or shame the individual in public places. This can include making the target feel like they are constantly being watched or ridiculed ike people walking by the subject start laughing out loud forcibly for no apparent reason.


7. Coercion or Threats: The group may use threats or pressure tactics, such as implying harm could come to the target if they don’t comply with certain demands or keep quiet.


Psychological and Social Impact:


The goal of gangstalking is often to create a sense of paranoia, fear, and distrust in the targeted individual, leading them to become socially and emotionally destabilized. The ultimate aim is to drive them to isolation, mental breakdown, or even self-destructive behavior, as they are led to believe that no one is on their side or that everyone is conspiring against them.


These covert operations are run by the Deep State Fusion Centers in each state, and many police departments are involved, worldwide.  It is funded by the CIA under the black budget, with the intention to silence or neutralize a  person, who is often a whistleblower or political activist.  Such operations have little to do with criminal gangs, as they are operated by official government-funded agents.  Private organizations, such as Infragard, Citizen Corps,  and Neighborhood Watch are often involved.  The database of targeted names is held in the FBI's Terrorist Screening Center - called the "Watchlist."  The Watchlist now holds approximately 1.5 million names, worldwide.  Federal Judge, Anthony Trenga, ruled that the Watchlist is Unconstitutional, because the FBI could not provide any evidence that the names were "known or suspected terrorists."

TI's are encouraged to email, call, or contact these people, using a Cease & Desist Letter.  Please do not threaten or harass anyone - Targeted Justice only seeks non-violent solutions.

The FBI supports Infragard by providing the eGuardian computer network.  This is a separate network that allows the FBI to communicate with Fusion Centers and Infragard, and conspire against Targeted Individuals.  Federal Conspiracy charges are very serious and carry heavy prison sentences.

Targeted Justice represents patriotic Americans and innocent civilians.  We are certainly not terrorists.  Like many famous Americans, including Dr Ron Paul, Senator Rand Paul, and President Trump  -  we are opposed to the Deep State, not the American Government. See the book, "The American Deep State" by Dr Peter Dale Scott, Professor at UC Berkeley.


Former CIA Director, John McLaughlin, admits the Deep State is real.  No longer a "conspiracy theory" - it is conspiracy fact.   https://www.realclearpolitics.com/video/2019/11/01/former_acting_cia_director_john_mclaughlin_on_impeachment_thank_god_for_the_deep_state.html

Gangstalking is also connected to the Martial Law plan signed by President GW Bush in 2007.  Grossly illegal and Unconstitutional.  State and County officials with the Office of Emergency Management are involved in the gangstalking, as well as, planning for Martial Law.  Citizen Corps is a known TERRORIST ORGANIZATION, that is funded and controlled by DHS. 


The Department of Homeland Security, created after the scripted  9/11 event, controls the policy and funding of the Fusion Centers that coordinate and pay for the criminals that chase you around, hack your equipment, destroy your property and break in to your house. It is a public-private partnership susceptible of RICO Act criminal prosecution.


DHS has developed a perfectly orchestrated operation of stalking and harassment inspired by the German Stasi. The movie "The Lives of Others"  depicts in excruciating detail this police state model that violates the most basic human and civil rights of people.


Infragard and Citizen Corps collude in these operations, avoiding having to answer to Freedom of Information Act requests. 


Under Article 32 of the Geneva Conventions - Gangstalking is considered to be Psychological Torture.

See: United Nations training manual  -  "Manual on the Investigation and Documentation of Torture" in the download section at the bottom of this page.


Watch the subculture of Gangstalking (2013)
https://www.newstatesman.com/2013/05/ruins-peoples-lives
 

Image from The Lives of Other, highly recommended movie that explains the Stasi state from where the

Piercing the veil of secrecy

"The Program" in a nutshell

FBI receives nominations from private individuals, criminals, and sheriffs' offices.  They nominate enemies, whistleblowers, business adversaries, people that denounce drug operations, ex-spouses, J6ers, parents that protest at school board meetings, and the like. 

Once the FBI places a person on the Terrorist Screening Database, the first stage is that of stalking, harassment, and surveillance to learn the victim's patterns and habits and work on isolating him or her from friends, family and society. 

Org Chart: subject to update

This org chart includes the lieutenants of the Deep State under the last administration. Notice that the Department of Homeland Security plays the lead role in the gangstalking program.

We are granting a waiting period to the current administration to determine if they will continue operating this criminal program or will nix it. 

The jury is still out...

FBI: "KEEP THE FEAR ALIVE"

FBI Official admits that they need to "Keep Fear Alive" - to justify their terror budget each year. 

Infragard is a TERRORIST ORGANIZATION that is controlled by the FBI.  They perform illegal surveillance, harassment, break into people's homes, they threaten, they steal, conduct property damage, Assault & Battery, and even Attempted Murder.

Targeted Individuals call it Gangstalking. 

FBI and DHS use Private companies to evade the FOIA

The Inspector General for the Dept of Justice determined that the FBI did not follow their own policy manuals, and regularly violated the Constitutional Rights of U.S. civilians.  It is the opinion of Targeted Justice that Infragard & Citizen Corps are TERRORIST ORGANIZATIONS.  The members of Targeted Justice have documented their crimes, including - harassment, gangstalking, illegal entry, vehicular stalking, assault & battery, theft, property damage, conspiracy, and attempted murder.  It is estimated that Infragard has more than 66,000 members in the United States. 

FBI touts the role of Infragard:

 https://www.fbi.gov/stats-services/publications/national-information-sharing-strategy-1

Downloads

advice-about-gangstalking-targeted-individuals_1 (pdf)

Download

houston-gangstalking-boss-1c_1 (pdf)

Download

targeted-individuals-how-to-fight-back_1 (pdf)

Download

the-governors-of-gangstalking_1 (pdf)

Download

ORGANIZED STALKING CONSTITUTES DHS-4A OBLITERATION

FUSION CENTERS VIOLATE BASIC CIVIL RIGHTS

“More often than not, information collected and shared at DHS fusion centers was unrelated to terrorism.”  -   --Senator Tom Coburn's report


The Senate Subcommittee on Investigations sent a memo to the DHS in 2008, instructing them to stop the illegal activity with Fusion Centers.  This memo is a Smoking Gun, admitting that the government knows.  https://www.rt.com/usa/intelligence-fusion-dhs-report-598/


“It’s troubling that the very ‘Fusion Centers' that were designed to share information in a post-9/11 world, have become part of the problem.  Instead of strengthening our counterterrorism efforts, they have too often wasted money and stepped on Americans’ civil liberties,”

   -- Senator Tom Coburn


The Senate Subcommittee on Investigations sent a memo to the DHS in 2008, instructing them to stop the illegal activity with Fusion Centers.  This memo is a Smoking Gun, admitting that the government knows. 


" ...the center does in fact spy on Americans – but only on those who are suspected to be ‘anti-government’.   So how do you distinguish between the suspects that are innocent, without first illegally spying on them?  It is not a crime to express your First Amendment rights, however, illegal surveillance is certainly a crime.  Across the US, Fusion Centers have reported on individuals who conducted ‘crimes’ like putting political stickers in public bathrooms or participating in movements against the death penalty. In October, the bipartisan Senate Permanent Subcommittee on Investigations finished a two-year investigation on Fusion Centers, only to find that the centers had directly violated constitutionally protected civil liberties."


“... the Subcommittee investigation found that the fusion centers often produced irrelevant, useless or inappropriate intelligence reporting to DHS, and many produced no intelligence reporting whatsoever,” the report stated."


Fusion Centers, FBI & Infragard use a secret network called eGuardian to communicate and share information about Targeted Individuals and Watchlist information.  Grossly illegal and Unconstitutional.  Read more about it here


BlueLeaks reveals that Fusion Centers employ undercover agents, and perform illegal and warrantless surveillance:

https://www.activistpost.com/2020/08/blueleaks-reveal-fusion-centers-employ-undercover-agents-to-target-activists.html


Arkansas State Fusion Center Director, Richard Davis, simply confirmed Americans’ fears: the center does in fact spy on Americans:

https://www.rt.com/usa/fusion-center-director-spying-070/


“More often than not,” information collected and shared at DHS fusion centers was “unrelated to terrorism.”  In other instance, surveillance is thought to have been conducted on regular civilians not reasonably suspected of any crime, despite a 2008 memo sent to the DHS warning, “You are prohibited from collecting or maintaining information on US persons solely for the purpose of monitoring activities protected by the US Constitution, such as the First Amendment protected freedoms of religion, speech, press, and peaceful assembly and protest.”  By interviewing dozens of current and former federal, state and local officials with fusion center connections and analyzing over a years’ worth of reporting from those facilities, the Senate subcommittee corroborated the results of thousands of pages of financial records and grant awards only to find “problems with nearly every significant aspect of DHS’ involvement with fusion centers.”  https://www.rt.com/usa/intelligence-fusion-dhs-report-598/


There is much disinformation about which organization(s) are behind the gangstalking of Targeted Individuals.  For civilians, Gangstalking is funded by DNI.gov and DHS Intelligence & Analysis Office (DHS.gov).  DHS provides the grant money, key personnel, software, databases, and policies and procedures for running the gangstalking operations through Fusion Centers in each state.  David J. Glawe and Brian J. Murphy are the current leaders of the U.S. government's (Deep State) gangstalking operations. 


See the free ebook by Richard Lighthouse, "The Governors of Gangstalking" available for download in the section above. 


Targeted Justice has learned that the DHS and FBI's Fusion Centers are the command centers for gangstalking.  This information came to Targeted Justice from a former cop, turned whistleblower.  Gangstalking is usually performed under a group called "Intelligence" or "Counterterrorism."  This justifies having a Security Clearance to hide what they are doing.   Infragard & Citizen Corps are involved in many states.  Anyone working at an Emergency Operations Center or 911 Call Center probably knows about the numerous calls regarding Gangstalking and Microwave Weapon Attacks.  The person in charge of the Cover-Up is called the "Intelligence Officer," or "Intelligence Manager," or "Intelligence Supervisor."  Use a search engine to find the Fusion Center closest to your city.  From a public sidewalk, you can take pictures of the vehicles entering and leaving the parking lot of any public building.


The FBI refers to their Gangstalkers as "Confidential Human Sources."   This is the official Perp Manual for the FBI:

https://www.targetedjustice.com/fbi---official-perp-manual.html


The FBI arranges payments for gangstalking through a corrupt system of fake receipts.

https://theintercept.com/2017/01/31/how-the-fbi-conceals-its-payments-to-confidential-sources/


Based on a vague tip, the FBI can surveil anyone.

https://theintercept.com/2017/01/31/based-on-a-vague-tip-the-feds-can-surveil-anyone/


There is significant evidence, much of this illegal activity is carried out through the Infragard and Citizen Corps groups.  This is done by the FBI and DHS to avoid Freedom of Information Act (FOIA) requests and to hide the criminal activity.  The FBI uses their eGuardian and iGuardian networks to securely store the records of their criminal activity.


https://www.fbi.gov/about/partnerships/infragard


https://www.infragard.org/


https://www.dhs.gov/citizen-corps


Information on illegal FBI secret operations:

https://theintercept.com/series/the-fbis-secret-rules/


For more information on gangstalking and other aspects of the targeting program, download Richard Lighthouse's free ebooks here.

 
For Government criminals & Confidential Human Sources (CHS):  Did you know some of your criminal friends are paid up to $500,000 per year by the FBI?    Where is your money?  How come you're not paid like that? https://theintercept.com/2017/01/31/how-the-fbi-conceals-its-payments-to-confidential-sources/ 

Paid Perps or Deep Trance Victims?

Highest-rated gangstalking cities

 If you have seen a hypnotist do a stage show in Las Vegas, then you know how powerful a deep trance can be, over a person.  Approximately 1/3 of the U.S. population is "highly suggestible."  Subliminal messages from cell towers, can get these people to say or do, almost anything.  Most gangstalkers are not paid perps.  These people are effectively in a deep trance, even while their eyes are open.  Events such as "street theater," can be orchestrated over these people, who are in a deep trance. 


​Do not be fooled  -  most of the gangstalkers are not paid perps.  Why would the government pay people, when they can get 1/3 of the population to do this, for free?   All of the illegal programs, such as chemtrails, vaccines, toxic air, implants, & poisoned food  -  are designed to place graphene and metal into your brain, which are easily vibrated by microwave frequencies, rendering you more "highly suggestible."   qEEG charts can prove this is happening.

TRAINING MANUAL FOR GANGSTALKING

A guide for gangstalkers

Dr. Rauni Kilde, M.D. was the Chief Medical Officer for Northern Finland, where she became aware of the government's Gangstalking program.  She wrote a book exposing the Targeted Individual program, that included the training manual for Gangstalking.  The use of British spellings, suggest that it may have been originally written by British Intelligence agents.


//


Chapter 18 Overview of Harassment Methods Used By (FBI’s) COINTELPRO, (OPERATION) GLADIO, Covert Community Recruits and Stay Behind (Armies): (OR “Instruction Manual for Community Gang Stalkers”)


1. GENERAL


Operations in general are of the “active surveillance” type. Passive surveillance is watching a target covertly, to obtain information about the target. Active surveillance can include information gathering, but it (also) includes the agent making the target aware they are under surveillance. Beyond active surveillance, agents perform acts to keep the target uncomfortable, around the clock. Although operations are silently approved of, and covered for by the official justice system, (they are not) seen as criminal in nature by citizens who do not have a strong sense of right and wrong.

Agents must take great care that each and every act of punishment is DENIABLE. This means that should the target complain to police, (or) any other officials, or friends, neighbors, family members, or doctors, the nature of the punishment must be seen as the target’s “overactive imagination” or better yet, an indication the target is mentally ill.

(The system) has worked for years to recruit the medical establishment to help maintain deniability, and today, most targets (are) immediately labeled as mentally ill and often forced onto anti-psychotic medication when they complain. But their agents must still do their part skillfully (to) perform acts of punishment, so (that) almost anyone the target complains to will deny a crime against the target has taken place. As an agent, you will be trained in how to do this.


(The system) has been blessed with advanced technology which enables heavy punishment at times the target is in their home, silently, through walls, and this is very deniable. Agents must pass their initial training and demonstrate a high level of commitment to maintain community safety, and the ability to operate deniably, before they will be considered for advanced electronic punishment training. Electronic punishment training is beyond the scope of this manual.

The organization is very fortunate in that we have been able to recruit top specialists to back up field operations people. Psychologists are the key to finding ways to maximize feelings of stress and hopelessness in the target, and degrading the target’s health, from many individual “minor” invasive punishment acts. Technician’s in all fields- telecommunications, electric power, building electrical and alarm systems, and utility employees in all fields use their positions to inflict many absolutely “normal-looking” problems on targets on an ongoing basis. And of course, the services of many skilled locksmiths are invaluable in this. As a community-based agent (CBA) you will have the privilege of working with a team capable of delivering better “justice” than the official system.


2. SURVEILLANCE


Surveillance is the foundation of all operations. Both community-based agent (CBA) visual surveillance and advanced electronic surveillance are used. This chapter will cover only local agent visual surveillance. Your local lead agent will schedule surveillance watches for each target in that community. Every target will have at least one CBA watching them (at) all times, even while at home and asleep. Each CBA surveillance team will be given a cell phone number for reporting target actions and movement to the local Control Center (CC).

Actions to be reported include, but are not limited to:

Target turns lights on to start the day.

Target uses toilet or shower

Target exits residence

Target drives away

Target arrives at work, or

Target shops or visits any other establishment or location.

Target arrives home

Target eats meal, at home or in restaurant

Target engages in sexual activity

Target turns lights off at the end of the day

Target turns light on in the middle of the night

Target travels out of town


Some of these observations will be performed by the Electronic Corps (EC), but CBA’s should attempt to make and report as many detailed observations of target activity as possible. The reason such detail is necessary is that the punishment phase of active surveillance requires that supervisors customize each punishment action to match the personality of (the) target, and the need to make each punishment action appear to be “life’s normal breaks.”

One important punishment function of surveillance is to sensitize the target. Targets are never told they are under surveillance or being punished. Instead, close, active surveillance and other activities, happening far to frequently to be written off as “life’s normal breaks,” will eventually cause the target to realize they are under surveillance and punishment.


As a community-based agent (CBA), you will be given specific instruction(s) on exactly when, where, and how to carry out punishment actions. As long as you carry out punishment instructions exactly as given, there is no way the target will be believed if they complain, and you will not be exposed to risk of action by law enforcement.


How well the punishment actions work depends on how accurate and complete your reports are in many situations(. The) Control Center (CC) acquires access to properties or apartments immediately next to the target’s homes or apartments. Because EC (Electronic Corps) has through-the-wall surveillance and punishment equipment, they will be reporting target activity along with community-based agents. In a typical setup, CBA’s may be posted in a parked car where the target’s home or apartment can be observed overnight, for example.


In this setup, the CBA in the car may be instructed to call, using walkie-talkie-style cell phones, another CBA (or team) waiting or patrolling by car nearby to follow the target, or, you may be assigned to follow the target yourself. You will receive instructions from your local center as to following the target.

Targets in transit may be either covertly or visibly followed. When in doubt, hang back a bit, and contact the center for instructions, as targets in transit can present many unanticipated situations. The Center will always have the target’s position monitored, so if a target gives the CBA the slip, it will assign other appropriate community based agents to pick up the target at the earliest opportunity. Be sure to notify (the Control Center) immediately if you lose the target.


When applying the visible following of a target, making the target uncomfortable because of your presence, you will be given instructions as to when to break off the following. Another CBA or CBA team may pick up the visible following, but once you have broken away, they advise that you are clear and ready for the next assignment.


3. INTERCEPTS


Intercepts are where community-based agents (CBA) will appear to “just coincidentally” cross paths, on foot, with the target. Once the target has been sensitized to the point of realizing they are under surveillance and punishment, they will recognize, and be made appropriately uncomfortable by, the simple act of multiple CBA’s “just happening to” cross paths with them.


Your local control center will instruct you as to how you will be cued to perform an intercept. Often you will have an on-site supervisor (OSS) position you, and give you hand signals as to when to start your movement to intercept the target. Because targets moving about aren’t always totally predictable, the success of CBA intercepts depends heavily on the Electronic Corps who have means of monitoring the exact whereabouts of every target, and through computer programs, predict exactly when and where a target will be as they move about the community. Your local OSS has a special means of receiving instant, silent instructions for the Center.


1. Intercepting CBAs may be asked to perform one of the following forms of intercept:

2. Simple path crossing, requiring the target to take evasive action to avoid collision, multiple CBAs sometimes perform this several times during a single outing by a target.

On foot, walking for an extended period on the opposite side of the street from walking target.

3. Arriving at a place known to be a favorite of the target, and simply occupying that place just as the target is about to arrive (restaurants, parks, public facility seating, even bus seats are examples); sometimes just “hanging out” in such a location at times and places where people don’t ordinarily do that.

4. Smoking, coin-jingling, whistling, or toe-tapping near the target at a location where the target is known to need to stand, as to wait for the bus, or standing right behind a target at a water fountain.

5. A group, as many as a dozen CBAs, may be assigned to arrive at a store just ahead of a target, and form a queue ahead of the target, spending time buying lottery tickets, to delay the target. (The target) is very tired and eager to get home after work, for example, or in a hurry.

6. Community-based agents may be assigned to leave a next door home or apartment exactly the same time as the target, repeatedly. Alternatively, a CBA may intercept the target a short way before home and arrive at exactly the same time as the target.

While these may seem like trivial acts, keep in mind that the target will have these “trivial” things happen every single day, and repeated intercepts like these will force the target to always watch for such acts, essentially ensuring the target never “has a nice day.” This is the goal, to ensure the target’s punishment. Similar intercept operations are performed with vehicles. The Center can schedule these every day the target commutes, and both to and from work. Vehicle intercepts are particularly effective when the target sees the same vehicle in an intercept convoy both in the morning and in the evening commute. (Because vehicle intercepts can be dangerous, CBA assigned to vehicle intercept duty must successfully complete a special training course prior to actual assignment.) Here are some examples of vehicle intercepts a community-based agent (CBA) can expect to be assigned.


-Parking so as to prevent a target’s leaving a parking area, and then disappearing.

-Parking commercial vehicles often, near target’s home with something unusual about these vehicles, such as there is no need for that trade, or just unmarked white vans to make the target think the van is there to conduct surveillance.

-Simple following, or leading, a short distance, but every day. Doing this, both during target commutes and then other times makes the target very uncomfortable.

-Passing as side street stop sign, then stopping an uncomfortable distance into oncoming traffic just as target is about to arrive at the side street, causing the target to have to slam on the brakes (this requires Control Center assistance and prompting by walkie-talkie style cell phone.

-For a CBA vehicle convoy, boxing in the target during a commute, forcing the target to travel at a lower speed than the target wants to travel. In some locations, the Center will supply special license plates to CBA vehicles with short words which have special meaning to the target.

-For a CBA convoy, and where the target is at a location (and time) where traffic is normally very sparse, cause heavy traffic, forcing the target to notice.

The ultimate vehicle intercept is the staged accident. This can be dangerous and is only assigned to very senior agents. However, it is possible to stage an accident so only the target knows it was staged. This is an excellent means of punishment where a target has committed a serious offense specifically against secret services by revealing their criminality to the public. Generally, staged accidents are done in jurisdictions where police strongly support the operations, so that the CBA driver is protected.


4. PHYSICAL SABOTAGE


Physical sabotage is an especially effective form of punishment when it is carefully limited to low value items, below the value where police will take the report seriously. For example, burning a target’s house down, or even stealing an expensive appliance, would bring official investigators into the picture, so that is not done.


Sabotage producing extreme safety hazards is generally not suitable for operations, because of the potential for bringing official investigators to an accident scene. So while damaging the brake system of a target’s vehicle is not allowed for community-based agents (CBAs), draining some of the oil, transmission fluid or radiator antifreeze is allowed, but not all of it. The goal is to make it looks as if the target is negligent in maintaining fluid levels, and generally not causing a catastrophic failure that non-targets might see as sabotage.


It is very important to apply punishment by way of a large number of small value sabotage acts, because that makes it look like the target is forgetful, exaggerating, or in some cases even delusional, if they complain about many cases of small value damage. The target’s associates will simply refuse to believe that anyone but the target is responsible.


Sabotage is very important in that it lets the target know they are totally helpless to stop it, and can’t even complain about it effectively without appearing mentally ill. (The) organization (is) very fortunate in that some people, hearing about sabotage from a target did the sabotage themselves, “to get attention.”


Sabotage is applied at the target’s home, workplace, and on their vehicle. This requires the assistance of locksmiths and alarm technicians. Your local Control Center will supply this help, and will bring specialists in from a distance in the case of rural areas.


Here are some examples of sabotage a community-based agent (CBA) may be assigned to carry out:

-Entering a vehicle, or home, and changing control and radio settings.

-Replacing window washer fluid with water, possibly destroying the system in winter.

-Scratching the paint on the target’s vehicle, scratching furniture and valuables.

-Tire sabotage, from removing some air right up to slashing a sidewall if authorized by the Center.

-Simulating a break in electric window heater strips.

-Cutting off the 4-way flasher button.

-Removing substantial amounts of oil, transmission fluid or antifreeze but not enough to cause catastrophic failure.

-Moving things around inside the vehicle to show the target someone got in.

-Unlocking the vehicle and leaving it unlocked, possibly even with door open.

-Small cuts to car’s upholstery.

-Unlocking the target’s front or back door and leaving it ajar while the target is away, even at midnight at New Year for Y2 hour.

-Moving furniture or carpets around fairly frequently to show the target someone was there.

-Stealing low-value items, especially items like scissors which can be easily misplaced, keeping them until the target replaces the item, then return the missing item, often in a place the target checked.

-Stealing important papers, especially those which will cost money to replace.

-Stealing irreplaceable photographs.

-While target is at work, remove mail from their box and toss it around. Repeatedly making wall pictures crooked.

-Setting clocks to the wrong time.

-Repeatedly dumping consumable supplies (e.g. coffee) to make the target think they are no longer capable of managing their supplies well.

-Starting small rips in new clothing, which are widened on repeated visits.

-Ripping crotches out of the target’s underwear, or stealing finest underwear, swim suits, etc.

-Replacing clothing with similar items which are too small for the target, like for children what target does not have.

-Ironing inside button flags over, making buttoning the shirt or top difficult.

-Carefully working the tip of a knife through seams in any air mattress or cushion the target may own, including replacements, on a daily basis.

-Breaking zippers in clothes and bags, perhaps by pulling out a tooth or two.

-Shoving a knife through the soles of waterproof boots.

-At work, removing screws from the target’s office chair, or at home dinner table leaving only one screw of four, left to tilt the table with china.

-At work, damaging or destroying (if not extremely obvious) a target’s work from a previous day, (for example), the computer is broken again possibly worse.

-At work, replacing current copies of computer files with an older copy- particularly serious if target is a computer programmer.

-At work, where some employees are or can be recruited to be community-based agents, set up “mistaken deliveries” of heavy goods which block the target’s office.

-At work, if the target is responsible for parts of the operation which can be sabotaged, do so repeatedly just as the target starts eating lunch, or is about to leave for home.

-At work where the target is responsible for materials (that) can’t be locked up, sabotage or with special permission from the Control Center steal the material.


Thefts have to be carefully considered and authorized by your local Center, unless you have authorization, do not steal. One particularly effective type of theft is to remove small value, but often used items from the target’s premises. Once the target has been observed purchasing a replacement, the item is returned. This not only causes the target to spend money uselessly, (it also) imposes a feeing of total helplessness on the target.


5. SABOTAGING THE TARGET’S REPUTATION


Sabotaging the target’s reputation- and all that goes with it, such as ability to earn a living, business and personal relationships- is a very special operations category. Newer community-based agents will not be assigned to “engineer” the method, but will assist in passing “rumours,” which are the main means of destroying a target’s public image.


“Rumours” consist mainly of lies. However, in order to secure cooperation of specific members of the community to participate in the punishment phase, additional information keyed to appeal to the patriotic or community service sense of such community members may be used as well. As mentioned earlier, the organization has many top psychologists and psychiatrists on permanent staff at headquarters, and some in larger population centers. It is their responsibility to design the campaign to destroy the target’s reputation.


These people listed below can be approached and given information which will cause them to make the target’s association with them uncomfortable, or break off all contact with the target.

-Business contacts.

-Supervisors.

-Co-workers.

-Casual social contacts, such as clubs a target may be a member of, or a group that frequents a bar where the target is a patron.

-Friends.

-Local fraternal organizations- they are motivated by the public service, and are an excellent source of assistance in keeping the target under surveillance, and participating in the punishment phase as well.

-Store staffs at places the target shops.

-Target’s landlord.

-Target’s neighbors.

-Tradesmen who are likely to service the target’s home, car, or business.

-Bus drivers on the target’s route.

-Local children.

-City employees, including emergency medical technicians, ambulances.

-Homeless shelter staff and residents where applicable.

-Family members (surprisingly, many are ready to believe negative information.)

-Especially, personnel at places the target applies for work.


How intensely (these sabotage operations are carried out) is governed mainly by the need to prevent the target from (learning) that the negative rumors are being spread. The goal is to keep negative information covertly flowing into the community, in such a way that those receiving the information aren’t likely to tell the target. One might think that friends and family members would instantly notify the target and side with the target. Fortunately, experience shows that co-opting friends and family is surprisingly easy, once they are informed about the target’s criminal record. The Headquarters staff have developed techniques which by and large prevent that, but those techniques are beyond the scope of this manual. Suffice it to say that it is possible to apply “incentives” which cause even people closest to the target to cooperate. These incentives are applied by specialists from our organization at higher than the local level. For the community-level CBA, the work of sabotaging the reputation of the target takes the form of simply carrying out instructions from your Control Center as to what you say to whom, how, and when.


6. DISCREDITING TARGETS


While the powerful silent support of operations by the justice and psychiatric systems has been sufficient to prevent the target from informing the public, the area of discrediting targets is an ongoing activity. Like sabotaging the target’s reputation, discrediting their public statements, web sites, media appearances, letters to the editor and the like are done under the supervision of psychologists and psychiatrists on their staff. If a community-based agent (CBA) has a good track record of intelligently carrying out assignments, and has access to a computer, the CBA may apply to the local Control Center for assignment to discredit work. Excellent communications skills are required. Some of the activities CBAs carry out under supervision are:


-Monitoring message boards, Wogs, and open media like Indy media for target posts.

This is normally done in special shifts and under scheduling and control at a higher level than your local CC. This monitoring is assisted by blog scanning software which will detect and instantly flag posts relating to activities. The CBA doing this work will immediately reply with comments like “Someone isn’t taking their medication” or “target name” has provided absolutely no evidence.” The CBA will then report the post to higher level supervisors for possibly more detailed responses.


-Monitoring newspapers in your area for letters to the editor regarding activities. Most editors and many reporters have been recruited and are willing to assist in keeping the important work of monitoring and neutralizing quiet, but once in a while, a letter to the editor will slip through. In this case, comments like “Someone isn’t taking their medication” are not an appropriate response. Transcribe and forward such a letter to the editor to the supervisor, along with your proposed response. The supervisor may edit your response, and will assist in ensuring your response is printed.


-Your supervisor will have staff monitoring upcoming talk show appearances by targets. While most talk show hosts, even those somewhat sympathetic to targets, have received discrediting information and often will not host targets, some targets do manage to get on the air. In this case, your supervisor will assign you to call in to the show, and instruct you as to appropriate things to say, such as rebutting the target’s claims, pretending to be a target calling and making “wacko” statements such as “UFOs are harassing me,” or pulling the discussion away from real activities and to something like “media mind control.”


-Agents who have excellent persuasive communication skills can be assigned, with careful coaching and preparation from supervisors, to pretend to be a target and get on talk shows known to air targets as the guest. These opportunities are great ways to discredit targets by talking about UFOs, things like black helicopters following you, foil beanies, satellites “parked” just above your home, and perhaps events normally considered “paranormal” like seeing (things that) appear and disappear. These discrediting topics must be a total surprise to the host, only mentioned after the show is in progress.

-CBA can “casually” describe the “odd behavior” exhibited by the target as a result of around the clock activities to the target’s neighbors. The idea is to focus the neighbors’ attention to the target’s behavior, hinting that maybe the target is mentally ill. This is easy once the target has developed suspicion that “everyone is out to get” him or her.


It is a special “honor” for CBAs to be chosen for target discreditation work.


7. TRADE-RELATED PUNISHMENT


This section will give some examples of ways community-based agents (CBAs) with specific trades or situations in the community can apply deniable punishment to targets.


-Underground utility crews, where the management has been recruited, schedule messy, noisy maintenance at the target’s home (or business if the target runs a business). This can include having the street torn up for extended periods, or repeatedly. FundIng for unneeded work is available from headquarters. Taxi drivers can delay arriving when called by the target, especially when going to the airport.

-Bus drivers have leeway, in nasty weather for example, to stop one stop away from awaiting target and wait there for perhaps 5 minutes, ostensibly to “get back on schedule.” This can also cause a target to miss connections with the next bus or train. This is especially effective when the target, exposed to bad weather, can see the bus waiting up the street for no apparent reason, or not stopping at all at your bus stop.

-Repair trades people can keep “getting it wrong” necessitating many recalls, be late, be messy, over-bill the target, and even damage things which were OK. This is especially effective in the automobile repair trade.

-Medical lab technicians can substitute blood samples, or otherwise falsify results making the target appear to have absolutely no reason for their complaints.

-Police can frequently pull the target over for frivolous reasons.

-Telephone and cable TV technicians can re-route legitimate calls to the target’s number in large numbers, and this will cause the target to get very angry with these totally innocent callers.

-Store staff where the target shops frequently can be instructed to remove items the target is known to need when a target is known to be coming. Store management can stop ordering a target’s favorite items.

-Restaurants and food delivery services can tell the target they are out of an item known to be a favorite of a target.


The key to successful punishment by trades people is that while the target is very likely to know they are being punished, these punishment acts must appear to the general public as “life’s normal breaks.”


8. TARGET’S HOME


Punishing the target at the target’s (home) is essential for effectiveness of secret service operations. If the target were punished in the community but was allowed sanctuary in their home, the creation of a “prison without walls” would not be complete. One of the very first things the Control Center (CC) will arrange is for homes or apartments adjacent to the target’s home to be occupied by both community-based agents (CBAs) and members in the Electronic Operations manual. Because operations are carried out 24/7 in shifts, homes and apartments which are leased or owned by staff are not used as dwellings. The lease or deed will bear either an entirely false name, or the name of a senior staff member whose actual home will be at a different location.


Some adjacent homes or apartments are occupied by neighbors of the target who have offered to cooperate in punishment of the target. The initial contact of neighbors to determine their willingness to cooperate is done by senior staff, and incentives to cooperate are often tendered. Here are some commonly used punishment activities which are carried out both by CBAs and cooperating neighbors of the target. Activities are rotated among the choices, but at least one of them is applied daily:


-Noise. Noise must be of a type which the general public deems “normal.” Remember that the goal is to have the target aware they are being punished, but not be able to convince anyone else that that is the case. Observe local noise curfews, but plenty of punishment can occur outside noise curfew times. The target must not have easy cause to involve law enforcement. Examples:

-Start leaf blower, times precisely when the target attempts to enjoy their yard, or when EC operators cue the CBA that the target is trying to nap.

-Loud music from neighboring home. This is an excellent action, as it is common. Time it so every time the target opens a window the music starts. The timing makes the point it is intentional punishment. EC operator can apply music in adjacent apartments with exceptionally powerful bass, directed at the target’s unit.


-Frequent squealing of tires near target’s home.

-In apartments, frequent drilling into a scrap of wood or masonry held against the target’s wall, floors or ceiling as if “working.” Alternatively, hammering. Especially effective when cued by EC operators that the target is attempting to nap.

-Tossing golf or tennis balls against the target’s home when the target is known to be trying to fall asleep. Ideal for cooperating neighbor children.

-Frequent use of sirens near the target’s home. Many emergency services employees have a strong sense of community service and willingness to cooperate in this, or by people posing as Jehovah’s Witnesses.

-Knocking on the door for frivolous/nonsensical/wrong address reasons. Especially effective when the target is in bed or having a meal.

-Trash. Leave trash in the target’s yard. Frequently, but CC staff will assist in scheduling this so that the target can’t quite have a case on which law enforcement will act.

-Terrifying the target’s pet. This requires entry while the target is away from home for an extended period and must be scheduled by CC. Electronic Corps (EC) operators can render a dog or cat passive for safe entry of the community-based agents, by electromagnetic beam.

-Wounding or killing the target’s pet. Rarely used, scheduled when the target has acted in a way so as to deserve special punishment, like divulging the name of a criminally acting secret agent.

-Killing domestic animals or wildlife and leaving them on the target’s doorstep. Scheduled when the target has acted in a way so as to deserve special punishment.

-Where the target owns substantial land, noxious activities can be arranged and built for next to the property. In one case, a dump, an auto race track, and a prison were built adjacent to a target who owned a large farm in an area of natural beauty. While this is rare, it does illustrate commitment to delivering punishment to those “deserving” of it.


-Cooperating police departments can visibly watch the target’s home. Possibly being parked in front of the home when the target returns, repeatedly.

Police officers who refuse to take complaint of harassment and sabotage of the target, who they label “disturbed” – really are NOT allowed to make diagnoses, as only medical doctors can do, but may get a raise- price- for their unlawfulness afterward. Police follow orders by e.g. Stay Behind, Secret Military-led organization, created by the CIA after WWII in NATO countries. They give orders in secrecy to police, media, legal system, and judges, etc. Thus, being above parliaments and governments as demonstrated, for example, in Norway when in 1957 the Chief of “Stay Behind” Sven Ollestad gave the security code of Norway to MI6 (British Intelligence) in the UK acting on his own! “We have to trust our allies,” he had said. Today, the security code of Norway is kept in Wales. Originally, Stay Behind was created with good intentions to fight communism. Today it is out of control, and a new, much bigger Stay Behind 2 is active in Norway. The Stay Behind logo resembles the NATO logo.


In Italy, Stay Behind was called Gladio 2 and dealt with terrorism secretly in Western Europe. It was responsible, for example, for the kidnapping and killing of Prime Minister Aldo Moro in 1978, while the blame was pinned on the Red Brigade. Today, enemies are communists and NATO (is the) opposition.

On November 22, 1990, the European Union forbade Operation Gladio, but although Norway follows most EU decisions, this one is omitted. Italy and Belgium had terror actions by Stay Behind, and when the organizations (ceased to exist, the terror operations also ceased to exist). In Norway, Stay Behind is called E14. What was its role in Norway’s terror actions, if any? Some have tried to get control of Norwegian Stay Behind (armies) already years ago. Who are the back men giving orders to those “officially” in charge?


The late Chief Medical Officer of northern Finland, and Targeted Individual, Dr. Rauni-Leena Lukanen Kilde


Appendix 1. Key Words and Phrases


Key words to chapter 18.

Major operational components of organization:

-Community-based agent (CBA)

-Electronic Corps (EC)

-Electronic Operations Manual

-electromagnetic beam

-Control Center (CC)

-On-Site-Supervisor (OSS)

Field Operations People

-Psychologists/Psychiatrists

-Advanced computer communications systems and computer programs

Elements of (secret service) gang stalking operations:

-Surveillance is foundation of all operations

-Operations are “active surveillance type”

-Passive surveillance, watching the target covertly, to obtain information

-Community-Based Agents- CBA

-Every act of punishment is DENIABLE

-Advanced technology enables heavy punishment (when) the target is in their home, silently through walls.

-Electronic Corps (EC) members get specialized Electronic punishment training

-Advanced electronic surveillance

-This manual

-Field operations people

-Psychologists are the key to find ways to maximize feelings of stress and hopelessness in target, and degrading target’s health.

-CBA’s are given cell phone number for reporting target actions and movement to local Control Center (CC)

-The Center (CC) always has target’s position monitored.

-Electronic Corps (EC) has through-the-wall surveillance and punishment equipment

-On-site-supervisor (OSS) will give hand signals

-Computer programs predict exactly when and where a target will be as they move through the community.

-OSS has special means of receiving instant, silent instructions for the Center.

-Intercepts are where CBAs appear to “just coincidentally” cross paths, on foot or by vehicle with the target.

-The ultimate vehicle intercept is the staged accident… excellent means of punishment where target has committed serious offense specifically against secret services by revealing their criminality to the public.

-Sabotage lets the target know they are totally helpless to stop harassment

-Thefts must be authorized by local Control Center

-Sabotage of target’s reputation- is special operations category- done by spreading rumors, consisting mainly of lies. The goal is to keep negative information about the target flowing through the community.

-The organization has many top psychologists and psychiatrists on permanent staff at headquarters. Their job is to design campaign to destroy target’s reputation.

-“Incentives” are offered to get neighbors, friends, community members to cooperate

-The “Organization has powerful silent support of operations by the justice and psychiatric systems

-Monitoring newspapers for letters to the editor regarding these activities.

-Monitoring talk radio show appearances by targets.

-Repair trades people can damage items (cars, travel trailers, etc.) of targets and/or overbill targets

-Police can frequently pull the target over for frivolous reasons

-Punishing the target at the target’s home is essential for effective secret service operations to create a “prison without walls.”

Operations are carried out 24/7 in shifts

-Control Center (CC) will arrange for homes or apartments adjacent to the target’s home to be occupied by both community-based agents (CBA) and members in the Electrical Operations manual.

-Electronic Corp (EC) operators can render a dog or cat passive for safe entry of the community-based agents, by electromagnetic beam.

Appendix 2. Key Terms from Rich (2011) and Equivalencies with Terms Presented in Kilde’s “Manual For Gang Stalkers”

Terrorism- The US and its allies will terrorize the civilian population to achieve political objectives. The DOD stated: “Some IW activities, such as terrorism and transnational crime, violate international law. US law and national policy prohibit US military forces or other government agencies (OGAs) from engaging in or supporting such activities. However, since our adversaries employ terrorism and transnational criminal activities against the interests of the United States and its partners, these activities are included… as examples of the range of operations and activities that can be conducted as part of IW (Information Warfare).”

4GW – Fourth Generation Warfare- is a form of political/information warfare waged against civilians by a state or other entity. It utilizes civilians and the military, indeed all of society, to target civilian adversaries (aka “domestic state enemies,” “insurgents,” extremists, non-state actors, “cells of fanatics,” citizen “terrorists”) who value national sovereignty and/or pose some perceived threat to the state’s interests. Anyone disseminating information contrary to the state’s (“national security”) interests may become an enemy. The goal of the New War is the psychological collapse of the new enemies using a combination of tactics. Defeating the new enemies involves the synchronized use of non-lethal directed energy weapons, isolation, deprivation, and PsyOps against individuals and groups (aka TA, target audience and TI, targeted individuals). 4GW is more or less synonymous with unconventional warfare (UW), irregular warfare (IR), asymmetric warfare (AW), low-intensity conflict (LIC), military operations other than war (MOOTW), and network-centric warfare (NCW). This new war involves international, interagency cooperation between the military, federal and local law enforcement, non-governmental organizations (NGOs), intergovernmental organizations (IGOs), the civilian population/private voluntary organizations (PVOs), and private government contractors. This multinational force (MNF), involving NATO (North Atlantic Treaty Organization) and the UN, is termed civilian-military operations (CMO). TI – targeted individual (insurgents, non-state actors (NSAs), dissidents, terrorists, asymmetrical threats, irregular threats, potential enemies, etc.)

Insurgents – those who try to persuade the populace to accept political change. The enemy does not necessarily use violence to promote social change. Their methods may be nonviolent. These are groups of individuals not under government control, against the established leadership, who will be targeted because of an action they might take in the future. These may include nonviolent protesters who are labeled as terrorists. They may ‘wrap themselves in nationalism.’CMO – Civilian-Military Operations- combines military, federal agencies, NGOs, civilian organizations and authorities, and the civilian population. CMO is used in friendly, neutral, or hostile operational areas, including populated civilian areas in which no other military activity is conducted. It is used to deal with domestic threats in the New War. The controlling faction of these PsyOp/CMO activities includes the military, federal agencies, NGOs, regional organizations, and international organizations that work with civil authorities. (In the US, this means the controlling faction is FEMA, DOJ, CIA, and other federal agencies (FBI, DHS, etc.). Civilians are used as irregular forces. CMO are interagency and global in nature. In the US, they are used as part of Homeland Security.

CMOC – Civilian-Military Operations Centers- is established in the civilian sector for exchanging ideas. It may be a physical meeting place or a virtual one through online networks. Daily meetings are attended by representatives of the military, NGOs, the private sector, and local officials. Discussions at these meetings may include any ongoing campaigns against domestic threats in the area of operation.C4ISR- Command, Control, Communications, Computer Center that utilizes Intelligence Surveillance and Reconnaissance. Multiple interacting components of C4ISRs include battlespace monitoring, awareness, understanding, sense making, command intent, battlespace management, synchronization, and information systems. C4ISR centers can be mobile or stationary, or virtual, or strictly computer-based. Each military service has its own tactical mobile C4ISR system; The Navy and Marines use ForceNet, the Air Force uses Command Control Constellation (C2 Constellation), the Army uses LandWarNet and WIN-T. Each type of C4ISR system is connected to GIG (global information grid).

CR – Cognitive Radio- (a kind of JTRS, or Joint Tactical Radio System) that consists of a computer which has AI (artificial intelligence). CR is an intelligent device that is aware of itself, the needs of the user, and the environment. It can understand and learn. DARPA helped create CRs through programs like the Adaptive Cognition-Enhanced Radio Teams (ACERT), and Situation Aware Protocols in Edge Network Technologies (SAPIENT).

GIG – Global Information Grid- developed partially by the MITRE Corporation, has been called DOD’s global C4ISR unit for netwar. It can quickly track down an adversary (target) anywhere on earth and attack them via DEW (directed energy weapons) and other forms of electronic warfare (EW). GIG uses existing commercial satellite and ground-based systems as well as GIG nodes such as aircraft, vehicles, and ships equipped with DR (JTRS). GIG is connected to all communications systems used by coalition and allied forces.

GWOT – Global War on Terror- use of 2nd, 3rd, and 4th generation warfare to achieve political/military objectives of the American Empire and New World Order.

IO – Information Operation- aka “cyber war,” information warfare,” network centric warfare (netwar, NCW) and command and control warfare (C2W).

In terms of activities of the internal enemy,” official sources suggest the act of simpoly conveying information alone can be described as IO. In this case, it is usually waged by people within oppressed populations.

In terms of government/military use of IO, DOD defines IO as: “The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specific supporting and related capabilities, in influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own.”

The 1999 “Air and Space Power Journal,” in an article called “What is Information Warfare?” states: Information Wafare is any action to deny, exploit, corrupt or destroy the enemy’s information and its functions; protecting ourselves against those actions and exploiting our own military information functions.”

This new war is fought for political purposes and revolves around the issue of gaining the support and influence of the population.

IW- Information Warfare- According to US Military and Defense Contractors, the “new enemy” use computers, the internet, fax machines, cell phones and public media to advance their objectives. They use “information operations” to influence state forces with the population. Various publications term the act of transmitting information “netwar,” “information operations,” “information warfare,” “information attacks,” etc.

Professor George J. Stein in “Information Warfare,” which appeared in Airpower Journal, stated: The target of information warfare, then, is the human mind…. The battle remains, the battle for the mind.”

What all this means is that the New War is an information war.

IO – Information Warfare-

Infrasonic and ultrasonic weapons- Infrasonic and ultrasonic generators, also called emitters and VLF modulators, are weaponized devices consisting of a directional antennae dish which can send acoustic pulses to a general or specific area. In 1972 France was using infrasonic generators which operated at 7 Hz on its civilian population. By 1973, the British was using the Squawk Box in Northern Ireland. This directional weapon could target specific individuals by producing an audible sound at about 16Hz which turned into infrasound at 2Hz when it coupled with the ears.

In early 1990s, Russia developed a 10 Hz VLF modulator adjustable up to lethal levels, capable of targeting individuals over hundreds of meters, causing pain, nausea, and vomiting.

As far back as 1997, the US DOD has been creating generators in the infrasound and ultrasound ranges (7 Hz and 20-35 Hz, respectively) which can cause these same effects.


These weapons can easily pass through most unshielded structures.


In their “Electronic Warfare” publication, DOD defines DEW as: “DE (directed energy) is an umbrella term covering technologies that produce a beam of concentrated EM energy or atomic or subatomic particles. A DE weapon is a system using DE primarily as a direct means to damage or destroy adversary equipment, facilities, and personnel. DE warfare is military action involving the use of DE weapons, devices, and countermeasures to either cause direct damage or destruction of adversary equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the EMS through damage, destruction, and disruption.”

DEW include microwaves, lasers, bright lights, holographic projections, and acoustics.


The two basic types of DEWs include microwaves and lasers. (Wavelengths of lasers are about 10,000 times smaller than microwaves). Both are part of the electromagnetic spectrum. The two main types of microwave weapons are millimeter wave devices such as the Active Denial System (ADS) and the electromagnetic bomb (e-bomb, which is the emission of a non-nuclear electromagnetic explosion or pulse).


DEW travel at the speed of light, are surgically accurate, can operate in all weather, are scalable, are silent and invisible (offering plausible deniability), their energy can pass through walls at distances of hundreds of meters to miles, and have long distance projection (tens of miles).


These weapons are mounted on platforms which can be a missile, aircraft, ship, vehicle, suitcase, radio, etc.

Appendix 3. European Parliament Resolution on Operation Gladio, Nov. 22, 1990:

Wikisource


On November 22, 1990, the European Parliament passed a resolution on Operation Gladio. Joint resolution replacing B3-2021, 2058, 2068, 2087/90


A. having regard to the revelation by several European governments of the existence for 40 years of a clandestine parallel intelligence and armed operations organization in several member states of the community,

B. whereas for over 40 years this organization has escaped all democratic controls and has been run by the secret services of the states concerned in collaboration with NATO,

C. fearing the danger that such clandestine network may have interfered illegally in the internal political affairs of Member States or may still do so,

D. where in certain Member States military secret services (or uncontrolled branches thereof) were involved in serious cases of terrorism and crime as evidenced by various judicial inquiries.

E. whereas these organizations operated and continue to operate completely outside the law since they are not subject to any parliamentary control and frequently those holding the highest government and constitutional posts are kept in the dark as to these matters,

F. whereas the various “Gladio” organizations have at their disposal independent arsenals and military resources which give them an unknown strike potential, thereby jeopardizing the democratic structures of the countries in which they are operating or have been operating,

G. greatly concerned at the existence of decision-making and operational bodies which are not subject to any form of democratic control and are of a completely clandestine nature at a time when greater Community cooperation in the field of security is a constant subject of discussion.


1. Condemns the clandestine creation of manipulative and operational networks and calls for full investigation into the nature, structure, aims and all other aspects of the clandestine organizations or any splinter group, their use of illegal interference in the international political affairs of the countries concerned, the problem of terrorism in Europe and the possible collusion of the secret services of Member States or third countries;

2. Protests vigorously at the assumption by certain US military personnel at SHAPE and in NATO of the right to encourage the establishment in Europe of a clandestine intelligence and operation network;

3. Calls on the governments of the Member States to dismantle all clandestine military and paramilitary networks;

4. Calls on the judiciaries of countries in which the presence of such military organizations has been ascertained to elucidate fully their composition and modus operandi and to clarify any action they may have taken to destabilize the democratic structure of the Member states;

5. Request all the Member States to take the necessary measures, if necessary by establishing parliamentary committee of inquiry, to draw up a complete list of organizations active in this field, and at the same time monitor their links with the respective state intelligence services and their links, if any, with terrorists action groups and/or other illegal practices;

6. Calls on the Council of Ministers to provide full information on the activities of these secret intelligence and operational services;

7. Calls on its competent committee to consider holding a hearing in order to clarify the role and impact of the “Gladio” organization and any similar bodies;

8. Instructs its President to forward this resolution to the Commission, the Council, the Secretary-General of NATO, the governments of the Member States and the United States Government.”


9. OTHER TACTICS


There are other tactics which are not strictly part of the categories discussed so far:

-IMPORTANT: Community-based agents (CBAs) are strictly forbidden from adding anyone to the list of targets. Target selection is done by senior Control Center (CC) staff or higher levels.

-Punishment of people who side with and help the target. Friends, family members, and citizens who do not place a high value on community sometimes help targets. In these very specific cases, CC-authorized punishment in the form of individual acts against them is appropriate. The system can arrange for these target sympathizers to be found guilty of crimes, or liable for civil actions, for example. This is important for maintenance of the system.

-Target bank accounts can be disrupted in ways which do not give the target cause to involve law enforcement. Examples: target protection can be changed to “youth account,” or, an overdraft protection feature can be disabled, or simply steal money from the account. It is called action of “international banking ring” and usually at first the sums are around 50 – 100 dollars which are taken when the target pays small bills.

-Money is never transferred to the journal subscription or membership in a certain club like “opposition to government surveillance.” Money simply “disappears” from the bank with help of cooperating employers. I have experienced the myself several times. Bank accounts are “hacked” for the payment and a new bill arrives for the already paid bill by the target, and the receipt of payment is stolen. There is cooperation with military intelligence, Stay behind, NATO, and foreign intelligence agencies also against their own population. (This is the) so-called secret silent war going on in all secrecy.

Appendix 4: From Total Individual Control Technology by Omnisense

Organized Stalking/Electronic Harassment. The New Hi-Tech Generation of COINTELPRO

In a Nutshell: Government sources are using directed energy weapons and artificial intelligence to terrorize, threaten, intimidate, discredit, silence, torture, and murder dissidents. In addition, security contractors (among others) are being hired as military thugs to gangstalk targets[19].

Zerzetsen: “Inflicting as much pain and suffering as possible without leaving any marks.[20]” Directed energy weapon programs revolutionized this…

Counter-proliferation programs are intended to subvert the potentials of a target while punishing them with psycho-sadist techniques. The perversions of cointelpro are notable. The murderous and sadistic ethos of government counter-proliferation programs echoes that of the Nazis and this perpetrator network of war criminals are committing sickening acts upon the global population.

Modern Day COINTELPRO Objectives:

These are counter-proliferation centered programs intended to subvert all progress

To discredit the target / To character assassinate / To slander the target

To taint the target’s image / To misrepresent the target

To suppress the target’s monetary success

To suppress the target’s good character qualities or people’s awareness of positive aspects of the target

To arrange a partner for the target or mind control the partner of the target

To destroy relationships of the target

To co-opt the target’s manifestation

To turn the target into controlled opposition (In terms of beliefs & actions)

To incriminate the target

To round down the target’s output and audience – To marginalize the target

To eliminate connections & networking ability

To suppress the target’s personality

Sanitization of pleasure, emotions, and individuality

To punish the target / To torture the target

To destroy the target’s life

To stop a target from procreating / Ending a target’s bloodline (Eugenics)

To suicide the target / To covertly assassinate the target

To cover up the targeting operation


“If they see too much power and originality coming out of someone, they either use it and siphon it or they undermine it in order to neutralize it.” ~Ahmad Enani (TI)


COINTELPRO 2.0 Methodology:


Covert remote influencing technology suite

COINTELPRO 2.0: Thought surveillance neural AI net for psyche profiling

COINTELPRO 2.0: Directed energy weapon mind control network for counter-proliferation targeting

Ai based retro-causation; Extensive international neural monitoring programs can calculate a target’s potentials before the target is aware of them

Gangstalking / Organized Stalking

Trauma based mind control – No touch torture

Character assassination / Slander via proxies

Technological illusions (PSYOPS) / misdirection

Electromagnetic mind control aimed at discrediting the target

Mind control of people who provide opportunities for the target

Use of family against the target (e.g. Mind control of family)

Use of pharmaceutical drugs against a target

To orchestrate the detaining of the target in a psyche ward

v2k to get a target diagnosed as a “paranoid schizophrenic”

Exaggerated, warped and untrue slander about the target is proliferated

Technology playing devil’s advocate via implanted thoughts to get a target in trouble

Agenda to incriminate the target (Advice for COINTELPRO targets: Stay lawful)

Use of ego against a target

Weaponized mind control against a target

Coercing of a target into appearing overly paranoid (e.g. An objective of stalking)

Specific technological control of a target’s body language or vocal tone (e.g. To generate mistrust)

Total individual control technology is used as a tactic to take away a citizen’s rights through faulty mental illness diagnoses[21]

Outlandish black project technology experiences intended to discredit when spoken

Use of electronic control grid to mind control misfortunes for a target

Synthetic social phobias ~ Synthetic social anxiety (e.g. Public speaker related suppression)

Suppression of whatever platform the target is talented in (e.g. Music production, software design)

To dehumanize a target via electromagnetic neuroscience

Severe targets are sanitized of pleasure, emotions, and personality

Synthetic suicide programming

Technologically enabled serial killers with a taste for revolutionaries & activists


Electronic Targeting Holocaust


“While all these traditional tactics have proven fruitful throughout time without waning effectiveness, the agencies involved in extreme cover-ups prefer another tactic that seems to have withstood the test of time too. That is labeling someone “paranoid schizophrenic” or mentally ill. Once that label has been attached to someone, almost all testimony will be disbelieved. The military has employed this tactic since the 60’s to get rebellious soldiers and others locked up in mental hospitals. But since the weapons testing of neurological disruptor technology has begun on the general population beginning in the early 60’s and then stepped up to full throttle in 1976, the scope of what is considered mentally ill had to be reprogrammed into a broader definition for the general population.” ~Department of Defense Whistleblower: From the Out of Print Book – The Matrix Deciphered


“My name is Dr. John Hall, I’m a medical Doctor from Texas. As a physician, relative to some of what you’re hearing today, in the community we are seeing an alarming rate of complaints of use of electromagnetic weapons, microwave auditory effect, silent sound spectrum, EEG cloning,… Which has taken the lab out of the laboratory and into the home, most of these from the research that we’ve reviewed can be done remotely. It seems to be more weapons research than medical research. I’ve personally corresponded with upwards of 1,500 victims all complaining of identical complaints from every state in the nation. Of being exposed to electromagnetic radiation. Non-ionizing radiation. For the use of cognitive control or behavior control….” ~Anesthesiologist Dr. John Hall Speaking to the Presidential Bioethics Commission


“I am also targeted and this is my story. My name is Sandra Fields. I’m an architect, recipient of Who’s Who of Women in America achievement award and have run a successful business for over 28 years. My life and livelihood have been compromised for the last 11 years by being attacked by electromagnetic radiation torture, and by organized stalking… Thousands of Americans are currently suffering from chemical, electromagnetic, psychological and physical torture with no government relief or laws. Our servicemen, prisoners, and thousands of unknowing innocent civilians are currently being lamed, tormented and tortured as a result of military research, medical research, pharmaceutical research, physiological and psychological studies that have virtually destroyed participants’ sanity, physical well-being, reputation and privacy.” ~Targeted Individual Sandra Fields, Speaking to Obama’s Presidential Bioethics Committee


“What the governments found, was that you could induce by changing the pulse frequency like Morse code of the microwaves going into the brain and interfering with the brain, by specializing on the pulse frequency you could induce psychiatric illnesses to the point where a psychiatrist could not tell if it is a genuine psychiatric illness or an induced psychiatric illness. So what you can do theoretically, is you can target an individual’s brain, they may have auditory hallucinations where they hear things, which is actually quite common with microwaves. Or show signs of schizophrenia, for instance 6.6 pulses a second can induce severe sexual aggression in men. … Technically what you could do is have someone committed to a psychiatric hospital or a jail for a crime, just by somebody saying that they had a psychiatric problem where by they didn’t.” ~Ex-British Royal Navy Scientist Dr. Barrie Trower


“They can cause insanity, and it was an experiment. One of the experiments was to take an ordinary sane person, cause insanity, and have a psychiatrist who was unknown to everybody diagnose schizophrenia, or paranoia or a psychiatric illness. That was a successful outcome. And the person would spend the rest of their life in an asylum in misery, but to the government scientists that was a success.” ~Ex-Black Project Scientist Dr. Barrie Trower

“The war against satellite terrorism isn’t just the USA. This is a global issue! I’m in tropical Queensland Australia and get battered daily.” ~Targeted Individual Amanda Emily Reed


MKULTRA Cover Stories


This technology has interacted with quite a large amount of people, however it is almost always misidentified as other sources[8].

Directed Energy Weapon Cover Stories:

Mental illness as an electronic harassment cover story

End game technology packaged under persuasive “spiritual warfare” illusions

Directed energy interaction packaged as the supernatural

Government technology under a cosmic being facade

Religious themed illusions / Using religion mythology as a means for cover stories

Extraterrestrial contact as a psychological operation cover story

Ghosts as a cover story – AI orchestrated phantom illusions

End game technology as a sorcery cover story

End game technology as the real source behind effective voodoo

Witchcraft as a directed energy cover story

Black project science under a black magic cover story

Directed energy attacks deceptively packaged as physiological ailments

Synthetic signals in the brain from implants framed as physiological ailments

“Psychic Attack” as a directed energy attack cover story

“Spiritual Attack” as a directed energy attack cover story

New Age cover stories (e.g. Disembodied spirit illusions)

Old age mythological gods used as a cover story

Human based electronic harassment with aliens packaged as the perpetrator

Scientology methods as a cover story for technological remote influence

Exotic neurobody illusions (e.g. Chakra, entity attachments, ethereal implants)

Inter dimensional being interaction as an electronic targeting cover story

Exploitation of illusory explanations to conceal directed energy crimes

“People who have already assimilated the cover stories are often not ready to hear the truth.” ~Omnisense

Beings Impersonated:

Neighbors (Targeted Individual v2k)

Black Ops Agents (Targeted Individual v2k)

Family (Targeted Individual v2k)

Deceased Loved Ones / Deceased Relatives / Deceased Pets (Psy Ops v2k)

Demons (Mind Control Cover Story)

Jinn (Cover Stories)

Archons (Cover Stories)

Inter Dimensional Beings (New Age Psy Ops)

Extraterrestrials (Cosmic Being Impersonation Programs / UFOlogy Bastardization)

Entity Attachments (New Age Psy Ops)

Shadow Beings (e.g. To Cause Fear from an Obscure Source)

Archangels (To Impersonate a Higher Authority)

Lucifer (To Persuade into Evil)

Satan (Satanist v2k)

RA (New Age Psy Ops)

Spirits (Spiritual Warfare Illusions)

Ghosts – Phantoms (Directed Energy Trickery)

Faeries (Rehashed Old Age Cover Stories)

Higher Self (Mind Control Cover Story)

Panpsychism Based Impersonations (e.g. Gaia aka Mother Earth Speaking to People)

Saints & Mother Mary (Religious Impersonations)

Holy Spirit (Psychological Direction Method / Sleeper Assassin Method)

Ascended Masters (Impersonation of a Higher Power)

Jesus (Any Vector of Vulnerability is Exploited)

Person’s of Note (e.g. To get a Target to Murder them, To Psychologically Direct)

Any Mythological God of the Past (These can be pretty cool)

God / Allah / Yahweh / Jehovah (Impersonation of the Highest Power)

Done via Electronic Telepathy Contact (Voice to Skull – v2k)

“Directed energy weapons operate invisibly while the inducible mental limits of directed energy weapons are the limits of consciousness itself, this makes for an incredibly potent environment for illusions of all types.” ~Omnisense

NeuroWeaponry & Artificial Intelligence Quotes


“The point of the program is to have maximum psychological effect and leave the minimal amount of evidence.[22]” ~Anonymous Targeting Program Insider


“In 1985 CNN did a special report on radio frequency weapons. They hired an engineer who built an “RF Mind Interference” machine based on Soviet schematics. The machine successfully transmitted images into a CNN reporter’s mind. The stunned engineer said that, given three weeks time, he could scale up the machine to use on a whole town, causing them to do things against their better judgement, see and hear things that weren’t there, etc. The pentagon said it was too sensitive a subject to comment on. Remember, these effects were achieved by civilians over 30 years ago! One can speculate that they’ve made great advances in the past decades.[8]” ~Targeted Individual Jim Hastings


Dr. Kilde’s Chapter 18 text is followed by these appendices:


Appendix 1: Key words and phrases, taken directly from this manual.

Appendix 2. Key terms from Rich’s “New World War: Revolutionary Methods For Political Control” (2011). (ETK comment: Note that the terms, definitions, military documents, laws, and patents provided by Rich prove the existence of the operations described in Kilde’s “manual.”

Appendix 3: European Parliament Resolution On Operation Gladio

Appendix 4: From Total Individual Control Technology by Omnisense

Downloads

training8rev1en (pdf)Download

LIST OF FUSION CENTERS

PRIMARILY FUNDED AND CONTROLLED BY DHS

We know that the Fusion Centers run the Gangstalking, because 3 different police whistleblowers have told us. Corroborate with official list of Fusion Centers to get any updates.


Alabama Fusion Center 

Montgomery, Alabama 

Phone: (334) 517-2660 

Fax: (334) 517-2746 

Toll-Free: (866) 229-6220

fusioncenter@alacop.gov

https://www.alea.gov/sbi/fusion-center


Alaska Information and Analysis Center 

Anchorage, Alaska 

Phone: (907) 269-8900 

Toll-Free: (855) 692-5425

AKIAC@alaska.gov


Arizona Counter Terrorism Information Center 

Phoenix, Arizona 

Phone: (602) 644-5805 

Toll-Free: (877) 272-8329

actic@azdps.gov

https://www.azdps.gov


Arkansas State Fusion Center 

Little Rock, Arkansas 

Phone: (501) 618-8001 

Toll-Free: (866) 787-2332

arfusioncenter@asp.arkansas.gov


Austin Regional Intelligence Center; Austin, TX 

Austin, Texas 

Phone: (512) 974-2742 

aric@austintexas.gov

https://www.arictexas.org


Boston Regional Intelligence Center; Boston, MA 

Boston, Massachusetts 

Phone: (617) 343-4328 

bric.bpd@cityofboston.gov

https://https://bpdnews.com/bric


California State Threat Assessment Center 

Mather, California 

Phone: (916) 636-2900 

STAC@CalOES.ca.gov

https://www.calstac.org


Central California Intelligence Center; Sacramento, CA 

McClellan, California 

Phone: (916) 808-8383 

Toll-Free: (888) 884-8383

info@sacrtac.org

https://www.sacrtac.org


Central Florida Intelligence Exchange (CFIX) 

Orlando, Florida 

Phone: (407) 858-3950 

cfix@ocfl.net

https://www.ocso.com/cfix


Chicago Crime Prevention and Information Center; Chicago, IL 

Chicago, Illinois 

Phone: (312) 745-5669 

cpic@chicagopolice.org

https://cpic.chicagopolice.org/


Colorado Information Analysis Center 

Lakewood, Colorado 

Phone: (877) 509-2422 

cdps_ciac@state.co.us

https://report.ciac.co.gov/


Connecticut Intelligence Center 

Hartford, Connecticut 

Phone: (860) 706-5500 

Fax: (806) 706-5535 

ctic@ct.gov

https://portal.ct.gov/DEMHS/Homeland-Security/Intelligence-and-Counter-Terrorism


Dallas Fusion Center; Dallas, TX 

Dallas, Texas 

Phone: (214) 671-3482 

dallas.fusion@dpd.ci.dallas.tx.us

https://www.dallaspolice.net/abouts/fusionCenter


Delaware Information and Analysis Center 

Dover, Delaware 

Fax: (302) 739-1609 

Alternate Phone: (302) 739-5996 

Toll-Free: (800) 367-2312

diac@state.de.us

https://www.dediac.org


Delaware Valley Intelligence Center; Philadelphia, PA 

Philadelphia, Pennsylvania 

Phone: (215) 897-0800 

Fax: (215) 683-2794 

dvic@phila.gov

https://dvicphila.org


Detroit and Southeast Michigan Information and Intelligence Center; Detroit, MI 

Detroit, Michigan 

Phone: (313) 967-4600 

DSEMIIC@michigan.gov

  

El Paso Multi-Agency Tactical Response Information eXchange (MATRIX); El Paso, TX 

El Paso, Texas 

Phone: (915) 212-4200 

Fax: (915) 212-0280 

pdfusion@elpasotexas.gov

https://www.elpasotexas.gov/police-department/fusion-center


Florida Fusion Center 

Tallahassee, Florida 

Phone: (850) 410-7645 

Toll-Free: (800) 342-0820

FloridaFusionCenter@fdle.state.fl.us

https://www.fdle.state.fl.us/FFC/FFC.aspx


Fort Worth Intelligence Exchange 

Fort Worth, Texas 

Phone: (817)392-4697 

intex@fortworthtexas.gov

https://www.fwintex.org


Georgia Information Sharing and Analysis Center 

Atlanta, Georgia 

Phone: (404) 561-8497 

GeneralInfo@gbi.ga.gov

https://investigative-gbi.georgia.gov/georgia-information-sharing-analysis-center


Greater Cincinnati Fusion Center 

Cincinnati, Ohio 

Phone: (513) 263-8000 

Fax: (513) 263-8225 

GCFC@GCFC.org

https://www.GCFC.org


Hawaii Fusion Center 

Honolulu, Hawaii 

Phone: (808) 628-2336 

hsfc@dod.hawaii.gov

https://dod.hawaii.gov/ohs/fusion-center


Houston Regional Intelligence Service Center; Houston, TX 

Houston, Texas 

Phone: (713) 884-4710 

HRISC-Fusioncenter@houstonpolice.org

  


Idaho Criminal Intelligence Center 

Meridian, Idaho 

Phone: (208) 846-7676 

ICIC@fusion.idaho.gov

https://www.isp.idaho.gov/icic

  

Illinois Statewide Terrorism and Intelligence Center 

Springfield, Illinois 

Phone: (877) 455-7842 

stic@isp.state.il.us


Indiana Intelligence Fusion Center 

Indianapolis, Indiana 

Phone: (866) 400-4432 

iifc@iifc.in.gov

https://www.in.gov/iifc


Iowa Intelligence Fusion Center 

Des Moines, Iowa 

Phone: (800) 308-5983 

intel@dps.state.ia.us

https://www.dps.state.ia.us/intell/fusion.shtml


Kansas City Terrorism Early Warning Fusion Center; Kansas City, MO 

Kansas City, Missouri 

Phone: (816) 413-3601 

kctew@kcpd.org

https://www.kctew.org


Kansas Intelligence Fusion Center 

Topeka, Kansas 

Phone: 785-646-0205 

KIFC@ks.gov

https://ag.ks.gov/about-the-office/affiliated-orgs/kansas-intelligence-fusion-center


Kentucky Intelligence Fusion Center 

Frankfort, Kentucky 

Phone: (502) 564-2081 

fusioncenter@ky.gov

https://www.homelandsecurity.ky.gov


Los Angeles Joint Regional Intelligence Center; Los Angeles, CA 

Norwalk, California 

Phone: (562) 345-1100 

Fax: (562) 345-1766 

jric@jric.org

https://www.jric.org


Louisiana State Analytical & Fusion Exchange 

Baton Rouge, Louisiana 

Phone: (225) 925-4192 

Toll-Free: (800) 434-8007

lafusion.center@dps.la.gov

https://www.la-safe.org/


Maine Information and Analysis Center 

Augusta, Maine 04330-0164 

Phone: (207) 624-7280 

Toll-Free: (877) 786-3636

intel.msp@maine.gov

https://www.memiac.org/


Mariana Regional Fusion Center (Guam) 

Agana Heights, Guam 

info@mlrin.org

https://www.mlrin.org/


Maryland Coordination and Analysis Center 

Woodlawn, Maryland 

Phone: (800) 492-8477 

mdwatch@mcac.maryland.gov

https://www.mcac.maryland.gov


Massachusetts Commonwealth Fusion Center 

Maynard, Massachusetts 

Phone: (978) 451-3711 

Alternate Phone: (978) 451-3700 

fusion@massmail.state.ma.us

  

Michigan Intelligence Operations Center 

Lansing, Michigan 

Phone: (517) 241-8000 

Toll-Free: (877) 616-4677

mioc@michigan.gov

https://www.michigan.gov/mioc


Minnesota Fusion Center 

St. Paul, Minnesota 

Phone: (651) 793-3730 

Fax: (651) 793-3731 

Toll-Free: (800) 422-0798

info@icefishx.org

https://www.icefishx.org


Mississippi Analysis and Information Center 

Pearl, Mississippi 

Phone: (601) 933-7200 

MSAIC@dps.ms.gov

https://www.homelandsecurity.ms.gov/Pages/MSAIC.aspx


Missouri Information Analysis Center 

Jefferson City, Missouri 

Phone: (866) 362-6422 

miac@mshp.dps.mo.gov

https://www.miacx.org


Montana Analysis & Technical Information Center 

Helena, Montana 

Phone: (406) 444-1330 

dojintel@mt.gov

https://dojmt.gov/enforcement/investigations-bureau/


National Capital Region Threat Intelligence Consortium (NTIC) 

Washington, DC, Washington DC 

Phone: (202) 481-3075 

NTIC@dc.gov

https://www.ncrintel.org/


Nebraska Information Analysis Center 

Lincoln, Nebraska 

Phone: (402) 479-4049 

Fax: (402) 479-4950 

nefusioncenter@nebraska.gov

https://niac.nebraska.gov/


Nevada Threat Analysis Center; Carson City, NV 

Carson City, Nevada 

Phone: (775) 687-0450 

ntac@dps.state.nv.us

https://www.ntacnv.org


New Hampshire Information and Analysis Center 

Concord, New Hampshire 

Phone: (603) 271-0300 

nh.iac@dos.nh.gov

https://www.nh.gov/safety/information-analysis-center


New Jersey Regional Operations Intelligence Center 

West Trenton, New Jersey 

Phone: (609) 963-6900 

roic@gw.njsp.org


New Mexico All Source Intelligence Center 

Santa Fe, New Mexico 

Phone: (505) 476-9600 

intelligence.fusion@state.nm.us

https://www.nmdhsem.org


New York State Intelligence Center 

East Greenbush, New York 

Phone: (866) 723-3697 

ciu@nysic.ny.gov


North Carolina Information Sharing and Analysis Center 

Raleigh, North Carolina 

Phone: (919) 716-1111 

Toll-Free: (888) 624-7222

ncisaac@ncsbi.gov

https://www.ncsbi.gov/NCISAAC


North Central Texas Fusion Center; McKinney, TX 

McKinney, Texas 

Phone: (972) 548-5537 

NCTFC@co.collin.tx.us

https://www.collincountytx.gov/sheriff/fusion_center/Pages/default.aspx


North Dakota State and Local Information Center 

Bismarck, North Dakota 

Phone: (866) 885-8295 

ndslic@nd.gov

https://www.ndslic.nd.gov/


Northeast Ohio Regional Fusion Center; Cleveland, OH 

Cleveland, Ohio 

Phone: (216) 515-8477 

Toll-Free: (877) 515-8477

info@neorfc.us

https://neorfc.us


Northern California Regional Intelligence Center; San Francisco, CA 

San Francisco, California 

Phone: (866) 367-8847 

dutyofficer@ncric.org

https://www.ncric.org


Northern Virginia Regional Intelligence Center; Fairfax, VA 

Fairfax, Virginia 

Phone: (703) 212-4590 

fcpdnvric@fairfaxcounty.gov


Oklahoma Information Fusion Center 

Oklahoma City, Oklahoma 

Phone: (405) 842-8547 

Alternate Phone: (405) 848-6724 

fusion@osbi.ok.gov

https://www.okfusion.ok.gov


Orange County Intelligence Assessment Center; Orange County, CA 

Santa Ana, California 

Phone: (714) 289-3949 

Fax: (714) 289-1025 

ociac@ociac.org

https://www.ociac.org


Oregon Terrorism Information Threat Assessment Network 

Salem, Oregon 

Phone: (503) 378-6347 

oregonfusioncenter@doj.state.or.us

https://justice.oregon.gov/ortitan/


Pennsylvania Criminal Intelligence Center 

Harrisburg, Pennsylvania 

Phone: 888-292-1919 

sp-intelligence@pa.gov

https://www.psp.pa.gov/law-enforcement-services/Pages/default.aspx


Puerto Rico National Security State Information Center 

Hato Rey, Puerto Rico 

Phone: (787) 793-1234 

nssic@policia.pr.gov


Rhode Island State Fusion Center 

Providence, Rhode Island 

Phone: (866) 490-8477 

Fax: (401) 458-1173 

fusion@risp.dps.ri.gov

https://fusioncenter.ri.gov/


San Diego Law Enforcement Coordination Center; San Diego, CA 

San Diego, California 

Phone: (858) 495-5730 

info@sd-lecc.org

https://sd-lecc.org/?AspxAutoDetectCookieSupport=1


South Carolina Information and Intelligence Center 

Columbia, South Carolina 

Phone: (803) 896-7133 

 

South Dakota Fusion Center 

Sioux Falls, South Dakota 

Phone: (605) 367-5940 

sdfusioncenter@state.sd.us

https://www.dps.sd.gov/safety-enforcement/homeland-security/fusion-center


Southeast Florida Fusion Center; Miami, FL 

Miami, Florida 

Phone: (305) 470-3900 

ioc@mdpd.com

https://www.iwatchsouthflorida.com/about-us


Southeastern Wisconsin Threat Analysis Center; Milwaukee, WI 

Milwaukee, Wisconsin 

Phone: (414) 935-7741 

stac@milwaukee.gov

https://www.milwaukee.gov/wiwatch


Southern Nevada Counter-Terrorism Center (Las Vegas, Nevada) 

Las Vegas, Nevada 

Phone: (702) 828-2200 

ansec@lvmpd.com

https://www.snctc.org


Southwest Texas Fusion Center; San Antonio, TX 

San Antonio, Texas 

Phone: (210) 207-7680 

swtxfusion@sanantonio.gov

https://www.sanantonio.gov/Southwest-Texas-Fusion-Center


St. Louis Fusion Center; St. Louis, MO 

St. Louis, Missouri 

Phone: (314) 615-4839 

info@sltew.org

https://www.sltew.org


Statewide Terrorism Analysis & Crime Center (STACC) 

Columbus, Ohio 

Phone: (614) 799-3555 

STACC@dps.ohio.gov

https://www.stacc.ohio.gov


Tennessee Fusion Center 

Nashville, Tennessee 

Phone: (877) 250-2333 

tfc@tn.gov

https://www.tn.gov/tbi/law-enforcement-resources/tennessee-fusion-center.html


Texas Joint Crime Information Center 

Austin, Texas 

Phone: (866) 786-5972 

TXJCIC@dps.texas.gov

https://www.dps.texas.gov/IntelligenceCounterterrorism/txJCIC.htm


U.S. Virgin Islands Fusion Center 

St. Thomas, Virgin Islands 

Phone: (340) 776-3013 

fusioncenter@vitema.vi.gov


Utah Statewide Information and Analysis Center 

Sandy, Utah 

Phone: (801) 965-3838 

SIAC@utah.gov

https://www.siac.utah.gov


Vermont Intelligence Center 

Williston, Vermont 

Phone: (802) 872-6110 

dps.vic@list.vermont.gov

https://vsp.vermont.gov/criminal/vic


Virginia Fusion Center 

North Chesterfield, Virginia 

Phone: (804) 674-2196 

vfc@vsp.virginia.gov

https://www.vsp.virginia.gov/FusionCenter/


Washington State Fusion Center 

Seattle, Washington 

Phone: (877) 843-9522 

intake@wsfc.wa.gov

https://www.wsfc.wa.gov/


West Virginia Intelligence Fusion Center 

Charleston, West Virginia 

Phone: (304) 558-4831 

wvfusion@wv.gov

https://fusioncenter.wv.gov/Pages/default.aspx


Western Pennsylvania All Hazards Fusion Center 

Pittsburgh, Pennsylvania 

Phone: (724) 778-8801 

wpahfc@pa.gov


Wisconsin Statewide Information Center 

Madison, Wisconsin 

Phone: (608) 242-5393 

wsic@doj.state.wi.us

https://www.wifusion.org/


Wyoming Information Analysis Team 

Cheyenne, Wyoming 

Phone: (307) 777-7181 

dci.intel@wyo.gov

https://wyomingdci.wyo.gov/dci-operations-section/criminal-intel





Targeted Individuals

personas objetivo

personas señaladas

Personne ciblée

Individu ciblé

Στοχευμένo άτομo 

فرد مستهدف

目标个人

目標個人

लक्षित व्यक्ति

Individu yang Disasarkan

Целевая личность

লক্ষ্যযুক্ত ব্যক্তি

Indivíduo segmentado

対象者

Zielgruppe

Diangkah Individu

대상 개인

Hedeflenen Birey

Cá nhân được nhắm mục tiêu

లక్ష్యంగా ఉన్న వ్యక్తి

लक्ष्यित वैयक्तिक

இலக்கு தனிநபர்

Individuo mirato

نشانہ انفرادی۔

લક્ષ્યાંકિત વ્યક્તિગત

Ukierunkowana osoba

Цільова особа

فردی هدفمند

ടാർഗെറ്റുചെയ്‌ത വ്യക്തിഗത

ಉದ್ದೇಶಿತ ವೈಯಕ್ತಿಕ

ਨਿਸ਼ਾਨਾ ਵਿਅਕਤੀਗਤ

ඉලක්කගත තනි පුද්ගලයෙකි

Individual vizat

Məqsədli Fərdi

Gerichte persoon

บุคคลเป้าหมาย

Kowane mutum da aka yi niyya

Целевая личность

লক্ষ্যযুক্ত ব্যক্তি

Indivíduo segmentado

対象者

Zielgruppe

Diangkah Individu

대상 개인

Hedeflenen Birey

Cá nhân được nhắm mục tiêu

లక్ష్యంగా ఉన్న వ్యక్తి

लक्ष्यित वैयक्तिक

இலக்கு தனிநபர்

Individuo mirato

نشانہ انفرادی۔

લક્ષ્યાંકિત વ્યક્તિગત

Ukierunkowana osoba

Цільова особа

فردی هدفمند

ടാർഗെറ്റുചെയ്‌ത വ്യക്തിഗത

ಉದ್ದೇಶಿತ ವೈಯಕ್ತಿಕ

ਨਿਸ਼ਾਨਾ ਵਿਅਕਤੀਗਤ

ඉලක්කගත තනි පුද්ගලයෙකි

Individual vizat

Məqsədli Fərdi

Gerichte persoon

บุคคลเป้าหมาย

Kowane mutum da aka yi niyya


Copyright © 2025 Targeted Justice, Inc. - All Rights Reserved.

Powered by GoDaddy

Please consider supporting us

Our community undergoes great financial hardship. We are appealing for your support to continue our fierce battle for freedom and restorative justice for targeted individuals.

Give

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept