Free Educational Flyer Download for Victims of Organized Stalking and Concerned Citizens

29/07/2014 02:54

Awaken America! Organized Stalking: A True American Crime

 

Note to victims of organized stalking and electronic weapons abuse: I am collecting stories from TI’s and their friends and families about their experiences for a book about this crime; furthermore, I am encouraging fellow victims of this crime to join me in an attempt to initiate a joint lawsuit against the U.S. Federal Government on charges of organized stalking, harassment, psychological warfare, torture, and illegal human experimentation. Please contact me at emsecured@hushmail.com or emsecured@gmail.com. Thank you! T.B. Justice

Dear Friends,

If you have been the victim of organized stalking, you know how difficult it can be to explain to other people who have never experienced it. Indeed, it is one of the most bizarre and brutal crimes ever committed. I want to help. Below you will find an educational flyer (cut and pasted) which helps people to understand what this crime is and how it is being perpetrated, as well as discourage community members from participating in it. I have found it to be a useful tool in my own day-to-day struggles. I encourage you to copy and paste it into a word processing program and make it your own. You can add your contact information at the very end if you want to give people a way of communicating with you. Also, I have attached a downloadable version which you can open, download, and/or print directly. Just be sure to select the “duplex” printing option in order to print both sides of the flyer onto one page. You will notice that the downloadable copy has pictures attached at the top as well, which helps to get people’s attention right away. You may wish to print this on yellow or some other colored paper for maximal effect. Hand it out to friends, family, your neighbors, utility companies, your internet provider, cell phone company, restaurants, and any place you have had to deal with harassment in the past.

Don’t be shy or embarrassed. Simply tell people you are educating the public regarding a very serious crime that has been committed against you, and thousands of innocent American citizens in communities all across the country. You no longer have to explain anything. Let me, and the internet links provided, do the work for you. Remember, if we don’t work together to stop this madness, this crime will never end. So stand up for yourself, your fellow TI’s, and in fact every citizen’s right to live a happy, harassment free life. Let’s all work together to educate America!

stalking.educational.flyer      

          WARNING! YOU MAY BE TARGETED NEXT!       

What you are about to read is a true story. For the past two years I have been under attack by a mostly unidentified group of assailants. Eventually I began doing some research and what I found was disturbing: There is a form of terrorism taking place across the United States in which innocent citizens are being targeted and harassed by multiple people to the point of psychological torture. I am not alone. Thousands of fellow citizens across the country have reported cases strikingly similar to mine.

These crimes are being called “gang stalking” or “organized stalking.” You will find hundreds of websites, blogs, and videos online from victims crying out for help, but due to the nature of these crimes they are extraordinarily hard to prosecute because they are designed to mimic mental illness. Even more frightening, in many cases the U.S. Federal Government appears to be the primary culprit behind the harassment—using the paranoid, post-9/11 national environment, the Patriot Act, and false investigations as leverage to do so.

  • The process begins when a group of trained professionals starts circulating vicious, false rumors about the “target,” such as claiming they are a criminal. In other cases they spread rumors that the victim is crazy, paranoid, or that they are just playing a prank on them. Whatever the case, they use these lies to recruit ordinary citizens into participating in the harassment and to discredit any complaints the target may file, as well as isolate him or her from friends and family. This is a silent smear campaign and participants are manipulated into not divulging any details to the target, giving him or her no opportunity to defend their reputation. They are thus tried, convicted and sentenced by the community with no form of due process.
  • The goal seems to be to assault the target on ALL levels—personal, professional, online, psychological, physical, legal, and financial—yet leave them with little or no grounds for legal recourse. It has been reported that in some cases gag orders citing national security are used to silence potential witnesses.
  • The target is then monitored around the clock and audio and video recordings are carefully edited and circulated among participants in order to justify the ongoing attacks. This monitoring is additionally used to break into the target’s home repeatedly, and to harass them via “noise campaigns,” “street theater,” and other forms of harassment wherever they go.
  • Many victims also report “electronic harassment,” which is the use of directed energy weapons, such as microwaves and lasers. This may sound like science fiction, but weapons’ experts around the world have testified that these weapons are real. More disturbing, ex-military officers have stated that the U.S. Government is using gang stalking as a way to discredit victims in order to test these weapons on them and engage in other forms of illegal human experimentation. This is said to be an extension of the MKUltra program the CIA perpetrated in the 1950s, 60s, and 70s. This is not a joke! These weapons are silent and they can be administered through handheld devices, by plane, or satellite. They cause tremendous cognitive and physical damage, including acute aggression, paranoia, hallucinations, debilitating insomnia, leukemia, lymphoma, and in concentrated attacks can reduce the human body to ash.

Organized stalking may be one of the most frightening and little known forms of terrorism taking place in the world today, and it is being perpetrated against American citizens right here on sovereign U.S. soil.

  • See reverse for more information and suggestions on how you can help.

What You Can Do to Help

  1. Educate yourself. Below is a list of videos and websites to get you started. Just be aware, a number of victims believe some websites and videos are fake, being designed by the perpetrators themselves in order to discredit true victim’s claims. Organized stalking is absolutely real. It has been reported by many thousands of people around the world.
  2. Do not participate! If someone asks you to participate in these crimes, in any way, report them to the police. If they claim to be government officials or law enforcement, remember that no one has the right to harass or intimidate a fellow citizen—especially your government! These people are criminals and they should be treated as such even if they are hiding behind badges.
  3. Do not believe them. Those involved in this activity are highly trained and deceptive, and they use misinformation and outright lies to manipulate the public.
  4. Collect information about the perpetrators, such as their name, phone number, license plate number, and take a discreet picture or video if possible. Give these items and information to the targeted individual, either in person or by email, even if you choose to do so anonymously. Also, be sure you hear back from them. In most cases victims’ email and phones are being monitored, and important communications are often deleted by the perps.
  5. Copy this flyer and share it with all your friends and family, and ask them to do the same.
  6. Contact your state representative regarding organized stalking and demand these claims be investigated.

YouTube Videos:

  1. This alarming, must-see YouTube Video presents an interview with Barrie Trower, a former Royal Navy microwave specialist who speaks on microwave warfare and its covert use against people: http://www.youtube.com/watch?v=kvn-8ITy0oc
  2. This is one of the most frightening videos I have ever seen, which documents the U.S. Federal Government’s current mind control and directed energy weapon’s testing program, which is allegedly being perpetrated against United States citizens all across the country: https://www.youtube.com/watch?v=PmhUoOenKS0
  3. This one is an interview with a former U.S. Army officer who speaks on the use of, and connection between, gang stalking, covert directed energy weapon’s research, and the United States Government. She also discloses the disturbing fact that drugs are being placed in victim’s food and water: http://www.youtube.com/watch?v=xZMNoIB6w30
  4. A clip from a conference hosted by Dr. Terry Robertson and Dr. John Hall at Sonoma State University regarding the use of energy weapons, mind control, gang stalking, the CIA and NSA: http://www.youtube.com/watch?v=oZtfpqVxmzU

Blogs and Websites:

  1. Here is a great blog that describes gang stalking protocol clearly and in detail: http://rohnertpark-cotati.patch.com/groups/rosanne-schneiders-blog/p/bp–are-you-stalking-an-innocent-victim
  2. A great website for information about gang stalking: http://fightgangstalking.com/what-is-gang-stalking/
  3. This blog describes one victim’s account of being a targeted individual in detail, and provides copies of this flyer as a download for victims and concerned citizens to distribute in their community. He is also collecting TI’s stories and evidence for a book project and a joint lawsuit against the U.S. Government: emsecured.wordpress.com

 

Introduction to Gang Stalking

Note to victims of organized stalking and electronic weapons abuse: I am collecting stories from TI’s and their friends and families about their experiences for a book about this crime; furthermore, I am encouraging fellow victims of this crime to join me in an attempt to initiate a joint lawsuit against the U.S. Federal Government on charges of organized stalking, harassment, psychological warfare, torture, and illegal human experimentation. Please contact me at emsecured@hushmail.com or emsecured@gmail.com. Thank you! T.B. Justice

Dear Reader,

What you are about to read is a true story. I am an American author living in Central Oregon. For the past two years I have been under attack by a mostly unidentified group of assailants. At first I thought these were locals who did not like me or my work. I teach meditation and spiritual awakening classes, and I have two published books on meditation. As these attacks progressed month after month, then year after year, growing in intensity and complexity, I began to realize that I was dealing with something far more organized, sophisticated, and frightening.

Eventually I began doing some research and what I found was disturbing: There is a form of terrorism now taking place in which innocent citizens are being targeted and harassed by multiple people to the point of psychological torture. I am not alone. Thousands across the country have reported cases strikingly similar to mine. Furthermore, as the following report will reveal, the system of attack they use is intentionally designed to mimic the symptoms of mental illness, making these cases extraordinarily difficult to prove. As a result they are often ignored outright by law enforcement.

As you research this crime you will find numerous blogs, websites, and YouTube videos devoted to what I have come to understand is called “gang stalking” or “organized stalking.” Many victims believe, however, that a number of these sites are intentionally ridiculous sounding in order to weaken true victim’s claims. Regardless of the false reports, the case you are about to read is absolutely true. I am forty five years old, with no history of any mental disease whatsoever. Furthermore, I have been interviewed about this by my father, J.W.D., Ph.D. [Full name withheld], who is a psychologist with over 40 years of experience in clinical work and research. While admittedly not unbiased, it is worth noting that he found me to be of sound mind with no symptoms of delusional thinking. I welcome further psychological evaluations and am willing to take a polygraph test by neutral examiners.

As for who is behind these attacks, many victims are blaming the federal government, cults, or mega corporations attempting to protect their bottom line. While I have tried to keep this report focused on factual incidents rather than speculation and perceptual interpretations, one thing is sure—these people are professionals. They know exactly how to cause severe psychological distress and get away with it. If you’ve never heard of it, here is a brief overview of organized stalking:

  • The process begins when a group of trained professionals (core group) begins circulating vicious, false rumors about the “targeted individual” or “TI,” such as claiming they are a criminal (child molester, rapist, terrorist, etc). Alternatively, in some cases they may just imply that the person is rude, paranoid, or simply pretend to be playing a practical joke. In any case, the core group uses lies in order to recruit ordinary citizens into participating in the harassment and to discredit any complaints the target may file, as well as isolate him or her from friends and family.
  • Those exposed to the smear campaign and recruited into participating are manipulated into not divulging any details of what is being spread behind the target’s back, so the victim has no opportunity to defend his or her reputation. They are thus tried, convicted and sentenced by the community with no form of due process.
  • The goal seems to be to assault the target on ALL levels of his or her life—personal, professional, online, psychological, physical, legal, financial, and so on—making them appear paranoid or mentally ill while leaving them with little or no grounds for legal recourse. It has been reported that in some cases gag orders citing national security are used to silence potential witnesses, suggesting government involvement.
  • The target is monitored around the clock and audio and video recordings are carefully edited and circulated among participants in order to justify the ongoing attacks. This monitoring is also used to break into the target’s home repeatedly, and to harass them via “noise campaigns,” “street theater,” and other forms of harassment wherever they go.
  • Many victims also complain about what is being called “electronic harassment,” which is the use of directed energy weapons (such as microwaves and lasers). This may sound like science fiction, but numerous weapons’ experts around the globe have testified that these weapons are real. More disturbing, ex-military personnel have started coming forward stating that the U.S. Government, along with other world governments, are using gang stalking as a way to discredit people in order to test these weapons on them and engage in other forms of illegal human experimentation. If this is true, and there is now substantial evidence that it is, this scandal may be the most serious breach of public trust ever committed by the Federal Government. Near the end of my report detailing my personal experience as a targeted individual, which I have titled “My Story…”, I add my own thoughts regarding this terrifying possibility under the heading “Summary and Motives.” Please be sure to read this section. These weapons are said to potentially cause a significant array of serious symptoms, including leukemia,  lymphoma, and other cancers; microwave and laser burns; paranoia, mental confusion, and active hallucinations; exhaustion and severe sleep disruption; depression, acute anxiety, and aggression; dizziness and lack of coordination, and others. And, in focused assaults, they can reportedly reduce the human body to ash.

I realize the post below chronicling this abuse is long, but I have come to believe that its length and detail are necessary in order to fully communicate the extent and seriousness of these crimes, which go far beyond the little which is outlined here. Please do not dismiss it lightly! Another challenge I have encountered is getting the report into the hands of those who can help. I have had at least three certified copies “vanish” mid-transit, which were mailed via the United States Postal Service to the New York Times, the L.A. Times, and an investigative reporter with CBS. Emailed copies to several important contacts have also similarly disappeared before being received. I have no way of determining how many copies have been intercepted. Clearly these people do not want the report reaching the media–or you.

Organized stalking may be one of the most frightening and little known forms of terrorism taking place in the world today, and it is being perpetrated against American citizens right here on sovereign U.S. soil.

Please help!

T.B. Justice

Must See Gang Stalking Youtube Videos and Websites

YouTube Videos:

  1. This is the most frightening video I have ever seen, which documents the U.S. Federal Government’s current mind control and targeted energy weapon’s testing program, which is being perpetrated against United States citizens all across the country. This is the true purpose behind organized stalking. The video provides detailed evidence, victim testimony, and clear analysis of this crime against humanity. Every human being should be required to view this. It is long and emotionally disturbing in parts, so I recommend watching in segments. At a bare minimum, please watch the first fifteen minutes: The Phoenix Project
  2. This alarming, must-see YouTube Video presents an interview with Barrie Trower, a former Royal Navy microwave specialist who speaks on microwave warfare and its covert use against people: Youtube Video Trower
  3. This audio recording is a radio interview with a former U.S. Army officer who speaks on the use of, and connection between, gang stalking, covert directed energy weapon’s research, and the United States Government. She also mentions that agents are putting drugs in targeted individual’s food and drink as a part of the gang stalking protocol. This may explain the numerous home break ins targets are reporting: Youtube Video Weapon’s Research
  4. Here is a recording from a conference hosted by Dr. Terry Robertson and Dr. John Hall at Sonoma State University regarding the use of energy weapons, mind control, gang stalking, the CIA and NSA: Youtube Video Sanoma State
  5. Here is a video about organized stalking tactics that identifies the system as a brainwashing technique: Youtube Video Brainwashing
  6. This is a long video and the narrator moves slowly from point to point but he does a good job of describing a vast number of gang stalking tactics in detail, many of which I have experienced firsthand: Youtube Video Gangstalking Tactics Detailed

 

Websites:

  1. Here is a great blog that describes the  gang stalking protocol clearly and in detail: BLOG
  2. “Before It’s News” Report on targeted individuals being used for illegal human research. 
  3. A professional organization … The International Center Against Abuse of Covert Technologies: http://www.icaact.org/
  4. This one is a good source of general information on gang stalking and the various abuses and terms used to describe those abuses and the people involved: Gang Stalking Tactics and Terms
  5. This one is a bit rambling and extreme, but it contains lots of information and links regarding gang stalking and electronic harassment by a TI who is clearly outraged (I don’t blame him! So am I!): www.torturedinamerica.org
  6. This website is a nonprofit organization that provides information and support for targeted individuals: www.freedomfchs.com

Excerpt from Another Gang Stalking Blog

Author’s Note: The following blog was exerted from: http://www.change.org//attorney-general-kamala-d-harris-investigate-and-prosecute-gang-stalking-in-california-2

Attorney General Kamala D. Harris: Investigate and Prosecute “Gang Stalking” in California

 

Petition by

Rosanne Schneider

Sebastopol, CA

Though relatively unknown, “Gang Stalking”, also know as “Organized Stalking” and “Cause Stalking”, is a covert protocol of harassment and torture which is widespread in California and around the world.

This protocol is characterized by 24/7 surveillance, … home break-ins, …. home, personal property and automobile vandalism, …. theft, … pet torture, … slander, … noise campaigns, … chemical assault, … income sabotage, …. electronic harassment, … and persistent, never-ending stalking by multiple stalkers.

Links:

http://www.examiner.com/article/how-nsa-spies-ruin-1000s-of-america-s-greatest-people

http://civilrightsconsult.blogspot.com/2013/01/covert-crimes-against-women.html 
 
http://www.nowpublic.com/world/gang-stalking-conversation-sheriff-mack 
http://www.randomcollection.info/catchcanada/

 

The gang stalking protocol can last for many years and it is intended to produce isolation, psychological and physical illness, destitution, homelessness and incarceration.

Seventy percent of the victims are single women. Many victims are also of African-American descent. We therefore believe that these organized crimes are the result of hate and prejudice.

Gang Stalking is also used as a tool of retaliation against whistle-blowers and activists, but independent women appear to be the largest group of victims, especially those who have been politically active or who have ended abusive relationships.

Police appear unwilling or unable to help and some victims report that they are involved. Most media sources seem reluctant to cover the story, though there are more and more exceptions to this reality.

If you do an internet search for “gang stalking”, you will find thousands of victims who are crying out for help, and hundreds of websites and videos attempting to expose these crimes. You will also find a lot of extreme sounding “disinformation” that has been placed on the internet by the perpetrators of these crimes for the purpose of discrediting the victims. These are well organized attacks on innocent citizens and should not be confused with typical regional gang violence.

Because these crimes are very well funded they have been linked to “Cointelpro” and “MKUltra”, former government sponsored programs of illegal experimentation and control, but this has not been proven. There is also speculation that some of these stalking groups are under the control of Homeland Security and that the process of protecting our communities from terrorism has been high-jacked by criminal elements. 

http://www.nowpublic.com/world/gang-stalking-cointelpro

This protocol has been the subject of many petitions which are aimed at Congress, the FBI, and the President.

http://www.change.org/search?utf8=%E2%9C%93&q=gang+stalking

We, the undersigned, are appealing to the Attorney General of the State of California to have the courage and tenacity to investigate and prosecute these covert organized crimes. It is hoped that this will set a precedence which other states can follow.

Photographic Evidence

These photos are not intended as a stand-alone evidence, but as supplements to my detailed report, posted as “My Story…” below. Please see the complete blog chronicling this harassment for clarification on what these photos imply.

  1. This picture shows one of hundreds upon hundreds of random texts I’ve received during the course of this harrasment. Even with my call/text blocker on my phone, this group still manages to sneak texts and calls through.
  2. This webpage appeared on my daughter, Brittany’s, phone just days after she filed a police report regarding an attempted breaking and entering her and her boyfriend witnessed at my house. This incident was videotaped. When we scrolled down the page, we noticed that it also showed pictures of webcams, safes, and various locks—all of the items Kirsten and I had spent the week shopping for.
  3. This shows a mysteriously “corrupted” photograph we found on my computer. The original copy of my report on gang stalking was similarly destroyed.
  4. This one shows a simple example of dozens of instances of “food manipulation” that have occurred in our home, as well as out at restaurants. “Food manipulation” is a common gang stalking technique that is intended to cause anxiety and paranoia at a very basic psychological level. It also encourages the target to eat at home more often. If it is true that drugs are being placed into people’s food, this tactic would make quite a bit of sense.
  5. This photo reveals two knots tied in our window fan’s cord. This may sound silly, but it represents a classic gang stalking technique. When these people break into a victim’s house, they leave a “mark.” This is a way of intimidating the victim and essentially letting them know that they were there, and that there is nothing the victim can do about it. They also want to make the victim appear “crazy,” however there is more to the breaking and entering that target’s commonly report. One ex U.S. Army officer has publicly stated that these people not only break into target’s homes to move stuff about and make them look like nuts when he or she reports it, they are putting drugs into their food. Anyway, despite how ridiculous this evidence sounds, it is true. This group has also entered my home and tied knots in our laptops’ cords, shoe laces, a jump rope, and other miscellaneous items. Kirsten and I discovered this fan together. Neither of us did this, and we live alone. Perhaps the cord tied itself…? Or maybe we were hallucinating? If so, the hallucination appears to have superimposed itself on the photograph below. That must mean you are hallucinating too.  Or, if the government is claiming to investigate us, as seems to be the case based on the conclusions I reach in “My story…,” perhaps this is some new investigative technique the general public has never heard of. If so, I would like to know what the purpose is. Taken in concert with everything else we have dealt with, to me it appears to be a form of psychological warfare. 
  6. Also, please see the attached file at the bottom of this post. It shows receipts from three certified copies of my report regarding this stalking, which were mailed to the New York Times, the L.A. Times, and an investigative journalist with CBS. These were mailed through the United States Postal Service as Certified Mail, but were never delivered. After arriving at their destination cities, they merely vanished into thin air. 

Screenshot_text

1. Random Text

Homeland Security

2. Random website on my daughter’s phone.

1

Corrupted Photo

3. Corrupted Photo

Food Manipulation

4. Food Manipulation

Fan

5. Fan Knots

ed Mail.missing

 

Gang Stalking. My story…

Original Date of Report: February 15, 2014

Last Updated: July 1, 2014

Filed with Bend Police Department on 2/24/14

Case Number: 2013-00225086

Author of Report: T.B. Justice

Bend, Oregon Email: emsecured@hushmail.com and em.secured@gmail.com

Re: Organized Stalking, aka Gang Stalking, or Cause Stalking

To Whom it May Concern:

This report is an attempt to document a complicated and often covert, but severe, case of harassment, cyber crimes, criminal trespassing, breaking and entering, and other miscellaneous abuses that have been perpetrated against me and my family by a group of mostly unidentified assailants in the Central Oregon area. Though it begins simply, please read through the whole report, much of which can be skimmed. As you will see, by its end this case develops into what I have identified as a full blown system of psychological warfare which causes profound damage. Near the end, I summarize my findings and put forward some frightening conclusions based on my own experiences as well as the experiences of numerous other victims of this heinous system of attack.

Phone Harassment This abuse began suddenly around May, 2012 as simple phone harassment when I began receiving continuous wrong number calls and text messages asking for an individual named “Mary Thomas.” None of these were particularly threatening in any direct way, just irritating. When I would inform the caller (or respond to a wrong text) explaining that they had the wrong number, the same person—or another individual—would soon contact me again using a different phone number, asking for the same person. Oftentimes this pattern was immediate: they would call, I’d tell them they had the wrong number (and/or I would block their number), and I would soon receive another message or phone call from a different number. In other cases, they would wait a day or two, or sometimes as long as a few days before contacting me again. In all, I have counted more than 300 wrong texts and calls to my number, but I did not keep track of many of these. I estimate the actual number to be well over 500. Eventually I changed my phone number and enjoyed a full two weeks of harassment-free phone usage. Then, out of the blue, the identical pattern of abuse erupted. Here is a short list of a few of the numbers these people have contacted me from:

[Author’s note: List of dozens of phone numbers withheld for public viewing, but are available to investigators upon request]

Cyber attacks On November 9th, 2013 (or thereabouts) at around 12 noon my computer froze and was remotely taken over. For five minutes there was nothing I could do to recover control. The cursor vanished and my screen was blocked by a document that I had open at the time. Immediately afterward, my laptop shut down and restarted itself, such as happens when a new program is installed.

Fast forward to November 18th when I read about programs hackers install on computers to utilize their webcam to spy on them. On a whim, I covered my web cam and within minutes I received “wrong number” call. The timing of this call was suggestive, as has been a pattern. This particular call came from ***-***-**** at 1:07 pm on 11/18/13.

Another incident happened on January 12, 2014 when my fiancée, Kirsten K., discovered that my laptop’s password had been changed by an unknown program or individual, effectively locking us out of my computer.

On February, 10th, 2014 at around 530 pm our home Wi-Fi system inexplicably failed. Our modem indicated that the system was locked in a “walled garden.” We then enlisted the help of an amateur computer specialist, Josh B., to resolve the issue and help us secure our network. After we got it back up and running, however, the system failed once again the very next day, and then again, and again. This has been a pattern we have not been able to resolve and it has directly interfered with our ability to communicate this crime. This, I believe, is one of its primary purposes. In fact as of this writing our internet service has once again crashed and we have not been able to restore it through hard resets of our modem or by  any other standard method.

After the “walled garden” incident, we were able to recover several physical (mac) addresses from our modem, which did not match any of the addresses assigned to our own devices. These addresses are the equivalent of digital fingerprints left by “electronic trespassers”. This provided us with tangible evidence that somebody had indeed illegally accessed our private Wifi and left a trail:

00:1b:77:32:ce:a6

e4:d5:3d:96:78:4f (this device was listed as Reckless D, or something similar, in our modem).

54:04:96:41:e1:90 (again, “Reckless D”) 84:7a:88:10:b5:9b

Eavesdropping and Electronic Wiretapping

Kirsten and I believe that our smart phones have had spyware installed on them, which we have been unable to remove. (For the record, both of our phones are encrypted and we have performed factory resets several times to no avail. This fact suggests that this eavesdropping is not actually occurring through spyware, but at the level of our cell phone provider, Sprint, or the government.) This conclusion comes in part from private information we have shared between the two of us, which seemed to have been intercepted.

For instance, when we decided to switch our internet provider from **** ********* to Century Link, we joked privately in our living room about naming our new Wi-Fi network, “FBI Surveillance Van.” Months later when Josh B. was helping us secure our Wi-Fi, he pulled up a list of available networks in our vicinity and we found that one of them was named “FBI Surveillance Van.” This network had never been there before, and it was gone the next morning.

Another reason we believe we are being eavesdropped on is connected with an additional form of harassment. Some of what follows may sound odd to those unschooled in how gang stalkers operate, but I assure you that, odd as it sounds, what I am about to report is true. Also, there are good reasons, I now understand, why this next tactic is so frequently used by these people. I will explain those in a moment. But first, the simple facts… Over the past nine months or so, virtually every time we have gone out to eat or ordered take out, our order is inevitably wrong. If we order a pizza with extra sauce, we get one with no sauce; order a taco, they give us a burrito. One day Kirsten and I called in a to-go order for burgers from a local restaurant, both of which came with a variety of deluxe toppings. This was called in on a whim from the privacy of our own home, using my cell phone. When we picked up our food and got home, we discovered that all we had been given were dry hamburger buns with patties stuffed inside. Another time I ordered a chicken taco and received a taco with no meat at all—just lettuce and cheese. Mistakes do happen, of course, but this pattern has been so consistent and blatant it cannot be ignored. In fact I have discovered that “food manipulation,” as it is called, is one of the trademark techniques used by gang stalkers. First of all, over time it causes intense underlying anxiety in the target by attacking one of the primary needs of human stability. Second, when it is done outside of the home at restaurants and fast food establishments, it causes the target to eat more often at home. You simply get tired of dealing with it. I know, because this is exactly what happened to me. Also, at least one ex-military officer has already testified that drugs are being placed in victim’s food, something that is much easier to accomplish in the victim’s own home. This may explain the numerous home break ins reported by targets….

Another incident I’d like to share involved Kirsten. One day she was at a store with her mom and the salesperson randomly mentioned something about the Portland Trailblazers basketball team. The next day Kirsten discovered that someone had broken into her Facebook account and “liked” the Trailblazers on her private page.

Also, as mentioned above, the timing of some of many of these wrong number calls defies coincidence. Oftentimes we will receive calls from unknown numbers while we are discussing this situation with others. For instance, I was on the phone telling my sister, Lara D., about this situation when a call from an unknown number broke through my call blocker app in the middle of our conversation. Another time, when Josh B. showed up at our home to help us secure our Wi-Fi, I had just opened the door and let him in when my phone rang … another unknown number. A third time, I went to visit my dad, J.W.D., who lives in Springfield, Oregon. On the way, I entered his phone number and full name into Kirsten’s phone. Later, while at his house, I started to tell him about this situation when his phone suddenly rang. The caller asked for “J.W.D.” exactly as I had entered it into Kirsten’s phone. When my dad replied, “This is J***,” the caller asked again for him by his full name. He said, again, “This is J***,” and the caller immediately hung up.

More recently, on June 10, 2014, I installed a camera blocker app on my phone, which is designed to deactivate the camera so it cannot be used by hidden programs to spy on the user. Within minutes of doing so I received yet another random call (from ***-***-****).

These represent just a few examples of dozens upon dozens of such incidents. If I were to list them all this report would perhaps triple in length.

Trespassing

At various times we have also had people come onto our property who did not appear to be on legitimate business. Six such instances involved employees of the United States Census Bureau, who came onto our property between January of 2013 and January, 2014. Kirsten and I were both present during four of these interactions, and during the other two Kirsten was home alone and chose not to answer the door.

The first time a lady knocked on our door and said that we had been chosen for a non-mandatory “random survey.” They wanted to know how many people lived in our home and if we had any dogs, etc. They claimed this was a “consumer survey.” We told her we did not wish to participate.

The second time, two or three months later, another U.S. Census employee showed up at our doorstep. This time I told her more firmly we were not interested and asked her not come back. The third time Kirsten answered the door but I was standing just behind her. It was a man this time who said he was usually sent out on “difficult cases.” Kirsten told him we were not willing to help and she virtually had to close the door on him.

Our forth face to face encounter with the Census Bureau was more significant. It happened at about 420 p.m. on 1/14/14. This employee’s name turned out to be Bill G*******. When he came to our home I told him we don’t do surveys and the USCB had been here three times before and told not to come back. I then asked to see his I.D., which was hanging around his neck.

When I tried to get his name off his badge, he covered it with this hand. I said, “What is your name?”

He replied, “Bill.”

I said, “What is your last name?”

“It’s on my I.D.,” he replied.

I pointed out that he was covering it with his hand, and I turned to Kirsten, who was behind me in our living room, and asked her to get me a pen and paper.

In response, this person pulled his identification badge out of my grip and stuck his other hand in his left jacket pocket and began pointing it at me, quite dramatically, as if to suggest he had a gun concealed inside. Kirsten walked up behind me just then and witnessed this bizarre activity as well.

I then retrieved a pen and paper and in the meantime the man charged off down our driveway headed for his car. I hurried after him, writing down his license plate number, make/model number: Govt plates: *****.

He drove off and I went to get our mail. On my way back home I was approached by the same USCB worker, who had evidently circled around our block. I told him “I want this harassment to stop,” and he replied “I know, call me. Call the number on the card.” He repeated this several times and handed me his business card.

He then claimed his actions were the result of a medical condition, however on a personal note, I have never heard of a medical condition that causes a person to shove their hand in their pocket and point it in a way as if to suggest that they are armed. This was clealy a blatant intimidation tactic.

A few days before this incident, on January 11th, 2014, on a Saturday night at approximately 5pm during a snowstorm, two girls knocked on our door stating they were Mormons looking for Kim K., Kirsten’s mom. This was not only odd due to the timing of their visit (as noted, it was Saturday night, it was already dark, and the snow was really coming down), but for the fact that the Mormons had never come to our door before, and Kim has not lived in the home for eight years. The other thing that grabbed my attention was that one of them had her hand lodged in her purse the whole time during the encounter in a way which suggested she had a weapon concealed inside, very much like the USCB employee had done.  

Breaking and entering

At some point Kirsten and I began to believe that someone/s was illegally entering our house while we were not at home. We began noticing discrepancies such as things being moved or left out of place, food being opened which neither of us had touched. On one occasion we went grocery shopping and bought a package of hotdogs. When Kirsten and I got home from work that same evening we discovered that the hotdogs had been opened, though left untouched (a prime example of food manipulation). On another occasion someone turned two cans of food upside down in our cabinet and moved them all the way to the front of the shelf (see the photograph marked Food Manipulation in my separate post on photographic evidence).

I installed a voice recorder on my phone and intentionally left it at home one night when we were out. We were gone for over four hours, and when we got home I found a four-plus hour recording on my phone, as anticipated. When I went to listen to it later I discovered that the recording had been cut down to 1 hour and fifteen minutes. Not surprisingly the recording was blank.

I then installed a covert spy cam on my phone which is designed to detect a person’s face when they look at the phone and automatically snap a picture. Once again, I intentionally left my phone at home one day when we were both gone. When I came home the app had been disabled.

To determine if/how they were getting in, I took a piece of note card and used the tip of a pin to lodge it securely between the slats of my garage door. When the door opens, the slats naturally come apart. This paper was wedged firmly in place making it highly unlikely that it could come out by chance. When we came home the paper had been dislodged and was lying next to our trashcan outside, indicating that our garage had indeed been accessed while we were gone.

Then, on Tuesday, January 28th, we set up a spy cam in our garage. We left the camera recording while we were away that evening. When we returned, the camera had been turned off.

After this incident we changed our garage door opener code. The next day (2/10/14) my daughter, Brittany D., and her then boyfriend, Jordan Y., parked down the street from our house on an stakeout while Kirsten and I were away. At about 6:30 pm they observed a white pickup truck circle our block, slowly passing our house. This vehicle circled the block three times in this manner, then pulled into our driveway. They then reversed out, and continued in the same direction they had been heading before (meaning, they weren’t just “turning around”). They once more circled the block, and pulled into our driveway a second time; reversed slowly out, then up again, and finally out, eventually speeding off down the block and away. We have a video of this incident. The trucks license plate number was *******, and there was a company name on the side that read “********** Lanscasping.

I later remembered seeing this truck parked in front of our house one other time. Kirsten and I left home one afternoon but I forgot my wallet and so we unexpectedly returned. When we turned onto our block this same pickup was sitting out front. Two guys hurriedly tossed a few things into the back, jumped inside and sped off; a third man was observed rapidly walking away from our house. This guy looked to be about 60 years old with a well kept beard, and was wearing a polo style shirt and shorts. He could have passed for a retired golfer. He wasn’t someone we had ever seen in our (very small) neighborhood, which is on a “loop” style street, thus we get very little outside traffic. This person exited our neighborhood on foot and was last seen waiting to cross the street toward a public parking lot.

On February 24, Jordan, Brittany, Kirsten and I went to the Bend Police Department to file a report regarding this incident, and I turned in a copy of this report that also included the recorded phone numbers, physical addresses picked up by our modem, and the incident involving the Census worker. This was our third time reporting incidents regarding this case to the police. They refused to investigate and offered no legitimate explanation for their refusal.

Kirsten and I then spent the next few days trying to set up a system to protect our home. We shopped for webcams, downloaded a camera monitoring program onto my laptop (I-Spy), rekeyed our home, and shopped for more secure deadbolts and safes at a local locksmith.

Two days after filing the police report (on February 26), Brittany heard someone enter their home, at ***** Drive in Bend, in the middle of the night (she does not live with me). At the time she thought it was my other daughter, Ashley D., but in the morning Brittany learned that her sister had not been home the night before. Furthermore, when Brittany opened her Smartphone’s web browser, a page instantly popped up which she did not recognize and had never visited before called “easterlock.com.” As we scrolled down this page we saw that it listed webcams, safes, locks, and other items, all the things Kirsten and I had viewed over the last few days (see attached Screen Shot from Brittany’s Phone).

I took this as a direct threat against my 18 year old daughter in response to her filing a police report regarding the above incident. 

Several weeks later Ashley heard a “loud noise” coming from their office. When she went to investigate she discovered it was coming from their computer. She noticed that the light on their webcam was on, which was unusual because they never use that camera and she had never seen it on before. She picked up the camera and looked directly into it and said “Now what are you doing on?” A moment later it turned off.

Since this time Ashley has been receiving random “wrong number” phone calls on her private cell phone, which, when she calls them back, do not connect to any valid number (she consistently gets recordings that the number she dialed is not in service).

At about 1 or 130 pm on April 3 while Kirsten and I were both at work we received an email alert from our I-Spy home monitoring system that our laptop recording system had been triggered. The email included a snapshot which appeared to show that my laptop had been closed (the picture was totally black except for the time/date stamp). We both received this same notification/pic in our separate email accounts. Within a few days this picture had been mysteriously, permanently, deleted from both of our email accounts. Additionally, whatever video I-spy had recorded that day had also been deleted from my laptop (the screen shots are just pictures extracted from videos, therefore if there is a screenshot there should be a video as well). See the attached picture of a Corrupted Photo, which I recently found on my computer. I am unsure if this is the deleted photo, mentioned above, since I cannot access it.

Also regarding “corrupted files,” shortly before I was to file a copy of this report with the police, I tried to open it only to receive a warning message from MS Word that the file had been corrupted or damaged. The file had apparently been destroyed.

Then, on February 27, just days after filing this report with police, which, as noted, included a list of physical addresses that had accessed our Wi-Fi, our modem rebooted itself without our prompting. When we then checked our modem to investigate, we observed that somebody had changed our modem’s settings from “save logs” to “delete logs” upon rebooting. We had intentionally set the modem to save its logs. As a result, all previous data was obliterated, including the physical addresses we had observed.

On the morning of 3/28/14 I noticed that my laptop’s battery was totally depleted (we had left it unplugged). This suggested to me that our laptop had been used while we were asleep the night before. I checked our modem’s logs and saw that indeed the system had been active between the hours of 12:30 and 12:43 a.m. One suspicious website that had been visited stood out, which I found on another later log as well. The website was “web4.realtracker.com”.

One day around this same period in March I asked Kirsten to go get our mail. In the privacy of our living room I joked with her that I didn’t want these people to steal this month’s copy of Esquire, which I receive via subscription (I wasn’t really concerned with the magazine being stolen. The joke was that we never seem to get anything of importance in the mail). A few days later I did receive the latest Esquire, and I placed it on our kitchen counter. When I returned home from work the next day, the magazine was gone and was never located.

At some point after this date I decided to reinstall Windows Vista on Kirsten’s laptop as it was evident someone had open access to our computers. I did this in the morning just before I had to go to work, and afterwards I stored her computer in a footstool in our living room. The next day when I went to retrieve it I noticed that the power cord had been tied in a knot. The way this was done was such that it could not have occurred by accident as the knot was formed in the upper section of the cord above the power converter. Thus one would have to unplug the cord from the laptop, tie a knot, and then plug it back in. A few weeks later, after I mentioned this incident to Kirsten, I found my own laptop’s cord tied in a similar fashion; then my jump rope; then a pair of shoes, which were tied together; then a window fan, which was tied in two places along the length of its cord and around the handle (see Window Fan photo).

These incidents represent just a sampling of NUMEROUS illegal home invasions.

Our Internet Provider

When I was dealing with the phone harassment, I called a few of these numbers back and two of them traced back to our internet provider (though it was not my account and they did not have my name or my phone number). This was suspicious since we had had so many obvious issues with our computers. During one of these calls that apparently came from them, the caller left a voicemail which said, “This is the Bulletin calling for Mary Thomas. Your subscription with us has expired. If you would like to renew, please call us back.” When I returned this call I reached a generic phone tree not for the Bulletin, which is a local newspaper, but for our ISP . Curiously, neither of these calls appeared on my phone records. I have no explanation for this.

I went to their office one day to inquire about whether our account had been accessed by any of their employees, and when I pulled into their parking lot I observed a car parked there which I immediately recognized. It was a classic, lime green American muscle car. It looked to be from the 1970s, or thereabouts. It is a highly recognizable car, and I had seen it consistently parked outside St. Charles hospital, where I taught meditation at the time. The other reason it stood out was because a group of people aged in their twenties and/or thirties was invariably sitting near this car on a spread of grass, and one of them would consistently approach me after my classes, sometimes engaging me in random conversation, or they would just get way to close to me, invading my physical space. This is another form of harassment I’ve repeatedly dealt with.

At our ISP I spoke with Chrystal L. a “customer service manager.” I told her about the calls I’d received from numbers that traced back to their company, the car, and our computer issues, and asked if she would compare my list of phone numbers with their employee records. I suggested she wouldn’t need to release the results to me directly, but could provide the information to the police. She refused. I mentioned the green car and she claimed she did not know of any employees who drove a car such as the one I described. However,  I must deviate from mere factual description here and add my opinion regarding this encounter: everything about her manner, tone of voice, and body language suggested to me that she was lying.

I then asked if my account had been accessed and she told me that her company does not track when or which of their employees access customer’s accounts, so she couldn’t tell me if any violations of our account had occurred. When I left she gave me her business card but blacked out her own cell number, claiming she had just changed it. Kirsten and I were still able to make out the number, however, and when I called it several months later (on 1/19/14), nobody answered but the call went to the voicemail of “Crystal with **** *********”, the company in question.

In late November 2013, we decided to close our account with them and transfer our internet service to Century Link. On Friday, 12/6/12 at about 1pm, about a week after our new service had been set up, a utility van from the old company, discussed above, parked outside our house, directly adjacent to where we have our Wifi set up. They remained parked there, idling, for some ten or fifteen minutes before they drove off.

Civil Liberties Violations

On May 30, 2014, I mailed copies of this report to the New York Times, L.A. Times, and the David Goldstein, an investigative reporter with CBS, via Certified U.S. Mail. According to the U.S. Postal Service, these packages were never delivered, apparently having “vanished” during transit (see Certified Mail Receipts, which are attached in a file on my “Photographic Evidence” post).

In early June I sent a copy of this report via email to a nonprofit organization dedicated to supporting victims of organized harassment (Freedom from Covert Harassment and Surveillance), but they never received the email or its attached document. Also in June I sent a copy, once again by email, to an editor friend of mine, asking him to forward it to various journalists, but he also mysteriously never received the report. In July I emailed a third copy to a person who was a target himself and had in fact testified in front of congress regarding his experiences. Whoever was behind his case illegally implanted a microchip in his shoulder. This has been medically documented. In any case, he never got my message. I have no way of determining how many copies of the report have never reached their intended recipients.

This represents, in some ways, the worst of this attack. Not only are these people harassing us in innumerable ways, engaging in felony eavesdropping,  and breaking into our home, they are directly interfering with our basic American right to communicate this story to the media and public through intercepting our mail, email, and limiting our access to the internet.

Miscellaneous abuses

What has been outlined here represents only a small portion of the abuse this group has perpetrated. Numerous other attacks have occurred in many forms, including online abuses such as placing fake orders through my website for books to international addresses which do not exist (according to Paypal), fake reservations for classes I am not teaching, harassment via e-mails, Facebook, and at my previous place of employment, which eventually prompted me to quit, noise campaigns, and much more. Some of this seems to amount to childish pranks, such as rotating both my passenger and driver-side mirrors so I couldn’t see traffic behind me (this occurred on 12/29/13 between 10 am and 5 pm while I was parked in the garage at the ****, which is a security building; thus, there may be video footage of it), unbuttoning both sleeves of the liner inside my jacket, so the sleeves pull out when I take my coat off, coercing fast food vendors and restaurants into getting our orders wrong, and so on. Taken as a whole, however, all of these things combined—day in, day out—have been psychologically exhausting.

Summary, Motive, and Suspects

While I have named a few suspects in a supplementary report,  which is available to investigators upon request, we do not know for sure who is behind this harassment. At first I believed this was either a personal vendetta by someone/s with special-forces or intelligence training who were motivated by the desire to attack my work. However, after much thought, I am no longer convinced this has anything to do with me personally. While I have no direct evidence, I feel I must openly vent here. It is possible I am being attacked either by Monsanto, the giant GMO food corporation, the Israeli Government—both of whom are known for their strong arm, bullying tactics—or the United States Government. I know this may sound farfetched, but there are several points to consider:

  1. My dad, noted above, is a highly articulate and vocal psychologist and activist against what he considers to be flagrant moral and legal abuses perpetrated by Monsanto, Israel, and the U.S. Government. He has been involved in various causes for many years, and is a member of activist groups like Veterans for Peace, among others. He is a very real threat to some very powerful people, and I believe I am being attacked as way tool to intimidate him by extension. On a side note he was recently falsely accused of a crime (this incident did not appear at first to be related to this harassment, but on deeper reflection it certainly may have been in an indirect fashion). The charges were soon dismissed, but he was and violently assaulted by two guards while in jail, an attack that was totally unprovoked. He is almost 80 years old, and this assault left him wounded to a degree that he required surgery. I believe these guards were paid to attack him. Furthermore,  his house has now been broken into at least three times, as documented by his alarm company, and now his alarm system has inexplicably failed entirely.
  2. The  assaults against me are being executed with military precision. The perpetrators are experts at attacking a person psychologically, and perhaps physically as well, while avoiding legal charges. The lengths they have gone to and the amount of energy, time, and money they have invested is perplexing. Obviously they are highly motivated, trained, and well funded. I am not incompetent when it comes to security and technology, but despite my best efforts I have been fully unable to protect myself and my home from these people.
  3. Due to the nature of some of the crimes it is hard to imagine this could occur without government support. For instance: The fact that our cell phones are apparently being monitored even though we have reset and encrypted them several times implies that we are either being harassed by Sprint Communications or the federal government. I will let the reader decide which is more likely. My understanding is this is simply not possible for ordinary hackers, and, on a side note, I found Edward Snowden’s report regarding the government’s ability to de-encrypt private communications enlightening and more than a little suggestive considering everything we’ve been dealing with. Here are a few more key facts that point to federal involvement…
  1. The U.S. Census worker who pretended to brandish a firearm was obviously involved.
  2. The local police have refused to investigate even my simple initial complaint of phone harassment. To the best of my knowledge they have not contacted a single number from the list I provided, they have made no attempt to question the USCB employee—an incident that was witnessed by my fiancée as well—and they refused to contact the “landscaping” company to inquire why one of their employees repeatedly circled our block and pulled into and out of our driveway several times. This incident was recorded on video, and as a reminder it occurred after we a) realized someone had been entering our home, b) documented that our garage door had been accessed while we were gone, and c) changed the garage opener code. This was not a coincidence!
  3. I have had at least three certified copies of this report disappear which were mailed through the United States Postal Service, once again suggesting government involvement.
  4. I am not alone in feeling that the government is participating in organized stalking. Many targeted individuals, as well as ex-government personnel, have started accusing the federal government of engaging in COINTELPRO-like projects again, using the Patriot Act and our nation’s paranoid, post-9/11 climate as leverage to experiment with new weapons, mind control, torture, and other illegal human experimentation. The leading theory is that some federal entity, such as the FBI, CIA, NSA, or Homeland Security, is using gang stalking primarily to discredit test subjects’ complaints by making them sound crazy, while at the same time justifying legal warrants by claiming they are “investigating” the victim. In any case, if some government entity is behind my case, I wish it to be noted that this is obviously not a valid investigation. It is an assault. I am not a criminal. I’m a meditation teacher and a writer, and that is all. There is no possible way I, or my activities, could be construed as a threat to national security except in delusions, or implanted and/or manipulated evidence by the perpetrators themselves.

Regarding the allegations of human experimentation and electronic weapon’s abuse, I am not sure what to believe. However, as a writer I feel obligated to divulge everything I have personally experienced, which has in fact included some bizarre physical and cognitive symptoms over the course of this abuse. I did not at first associate these symptoms with the harassment until very recently when I started reading other victims’ claims. Here is some of what I have experienced:

  1. Over a period of about two to three months during the summer of 2012, just after the harassing phone calls began, I suffered from severe itching and tenderness of the flesh underneath the skin of the palms of my hands and the soles of my feet, as well as across my scalp, and, once, along the length of my right shin and heel. This was not an external rash, so it was any kind of an allergic reaction, and it was clearly originating from beneath my skin. These symptoms were severe and maddening, causing me to scratch the afflicted areas endlessly, day and night, despite how painful the flesh underneath was. I have never experienced anything like this either before or since. When I went to see a doctor they could offer no explanation. To this day it remains a mystery. My daughter Brittany experienced a similar episode on her forehead after filing the police report. Interestingly at the time she reported her symptoms to me I had never told her about mine and yet they were identical.
  2. In late winter or early spring of 2014 I suddenly developed tinnitus, or ringing in the ears. Curiously, right about this same time I received two random emails from strangers who claimed to have read one of my meditation books and were looking for advice on how to deal with tinnitus during meditation. Recently I learned that tinnitus is something many victims of gang stalking reportedly develop. Nobody seems to know why.
  3. At about the same time the tinnitus started, I began to experience a sort of background metallic, bitter taste in my mouth that, while not constant, is continuous enough that it has made be become concerned about poisoning. While this sounds paranoid, I believe a certain amount of paranoia is warranted considering the number of times my home has been broken into. Furthermore, at least one ex-U.S. Army officer has testified that government agents have in fact been drugging people’s food as a part of their gang stalking regimen (watch the corresponding Youtube video listed on my separate blog post to hear this testimony for yourself). This would, perhaps, explain the motive behind the continuous illegal entries into victims’ homes.
  4. I have also developed medically unexplained dizziness, and on at least two occasions during face-to-face encounters with people I suspected to be involved in this stalking, I became acutely lightheaded and felt suddenly “detached” from my body and surroundings. This was severe enough that I was forced to grab hold of a nearby stationary object to keep from falling over. These incidents lasted only five to ten seconds but they were profoundly disturbing.
  5. Since this stalking began, I have been plagued by occasional sharp, shooting pains in my head, commonly referred to as “ice pick” headaches.
  6. I have also developed severe insomnia of a most bizarre sort, as has my brother Jon D. who currently lives with my dad. Even when I do manage to fall asleep I awaken within just a few minutes as a result of what seems like a random sound that occurs in the outside world but which I  realize, after awaking, was heard in my own head. Other times a spontaneous jerking of one of my legs or arms with force me awake. These brief sleep periods are invariably laced with strange and disturbing dreams of a sort I find myself struggling to describe and quantify as to why they are odd. After doing some investigating, I found that numerous other victims of organized stalking also report similar sleep disturbances.

What I do know for certain is that the organized stalking, harassment, eavesdropping and breaking and entering aspects of these crimes are absolutely real. After research and much consideration, I do believe these attacks are based on psychological warfare principles sometimes used by U.S. special forces and various intelligence agencies throughout the world. They are intended to intimidate, cause severe psychological suffering, and discredit the victim through a combination of mimicking mental disease, creating paranoia, and spreading false rumors in the victim’s community. Kirsten and I both have suffered enormous emotional distress as a result of these people’s actions, including insomnia, distrust of strangers, paranoia (though not unwarranted!), unnecessary conflict in our relationship, and fear for our lives—all symptoms associated with PTSD. We both feel we have been scarred for life as a result of this, and the damage is indescribable to people who have not been through something similar.

For more information on organized stalking, I have listed several websites and YouTube videos in a separate blog post. Much of what you will find online is absolutely real, however some of it is obvious misleading bunk. In my case I am a United State’s citizen with no history of mental illness, and I hereby testify that everything you have read in this report is true. Furthermore, the facts of this case … along with honest witnesses … cannot be denied. I have committed no crime, and have offered authorities my full cooperation in this investigation, including access to our phones and computers—invitations which they declined. Once again, this is not an investigation—it is an act of terrorism. Please stand up for your own rights by standing up for your fellow Americans.

With gratitude and hope,

T.B. Justice

July 12, 2014

Bend, Oregon

 

Please note : The content on this site does not always express the viewpoints of the site owner

Many topics are covered and links given, so that you can do your own research

 

FAIR USE NOTICE: These pages/video may contain copyrighted (© ) material the use of which has not always been specifically authorized by the copyright owner. Such material is made available to advance understanding of ecological, Political, Human Rights, economic, scientific, Moral, Ethical, and Social Justice issues, etc. It is believed that this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior general interest in receiving similar information for research and educational purposes.

globalnoncompliance.net