Friday, March 3, 2017

Necrophilia

Charges against Necrophiliacs are to be severe. The necrophiliac is to be chargesd as though the victim was alive:
http://time.com/3135722/ohio-morgue-sex-kenneth-douglas/

Friday, November 25, 2016

Gang Of Four

In China, here was 4 college students who were visiting China for college studies. They eventually heard of criminals who conspired against the government. They located some members of the group; and took propaganda pamphlets that the group handed to them. The students agreed with the propaganda; and, spread the propaganda to Chinese; to tell Chinese to oppose their government. They created a giant rebellion; against the government, by the Chinese people.
The government arrested the students and placed them in prison for death sentencing. The Queen of England requested the students be expelled from the country; and returned to England. After many contacts, the Chinese government agreed.; and, banned the students fro China permanently.
This vent was the real "Gang of Four" incident involving the 4 English students.

Criminal Psychology:Predators

Any criminal predator will perform similar operations. Here are a few:
* Always watch the target:
   [1] Professionals will usually have numerous people to follow a target. They will look at the target
        in intervals.
   [2] Uncontrolled criminals; such as sexual predators, will usually stare at the target.
* Predators will attempt to locate the home of targets
* Predators will wait to attack when the target is secluded from the public, in pulic restrooms; or, in        other secluded areas.
Without these basic situations, a predator will not succeed.

Saturday, August 20, 2016

Psywar Techniques

Presently, many operatives perform multiple functions in psywar operations. Of these operations, Intelligence Agency defects have trained hackers, street criminals, ex-convicts, homosexuals; and, other criminals.
Here are some of my own experiences with the operatives:
[1] Throwing wild rats in my bed when my window was opened: These rats are extremely hazardous in many ways; however, I am very well accustomed to wild animals. IN fact; before I terminated them, I fed some while they sat on my chest or head. On even slept with me under my pillow. This is a biohazard. I have classified this act as a attempted murder punishable by death.
[2] Claiming to be Intelligence or other government agent: This causes a person t trust the operative while the operative terminates the target from talking to the government; or, trusting them. This terminates public to government relations. I have classified this operation as a psywar against humanity and the government. It is punishable by death.
[3] Threatening to kill or injure a target. I have classified that operation as a terroristic threat punishable by death.
[4] Telling potential victims, they wotrk for the target; but cannot introduce anyone to the target. This is a propaganda psywar. They also tell the victims the target taught them the technology they possess.
[5] Young Geeks using electronics to strip the mind; and give it to others; in an attempt to kill the target.
[6] Using Felony Eavesdropping to listen in to a home.
[7] Using Felony Invasion of Airwaves to transmit signals or voices into a home.
[8] Using the electrical wiring of a building [Intelligence defects use this technique for electronics psywar] as an antenna to transmit signals.
[9] Bullying and starting fights; but, running away from the target if the target fights back.
[10] Laughing at misfortune and corrupt effects.
[11] Atalking targets with 5 and older children.
[12] Breaking into homes and adding substances to food and water.
[13] Stealing spirits and minds.
[14] Utilizing electronics to program targets.
[15] Switching portions of the mind for eavesdropping techniques. Usually, the target will notice a completely differential mental structure with differential thoughts.
[16] Asking for home location for others. Usually children do that.
[17] Linking people to targets to cover operations. Other people's minds completely cover thoughts of the target.
[18] Telepathic Bubonic Plague Effect Psywar. I created this technique in the 1980's era. It involves prgramming a target to send telepathic messages to others; for self destructive purposes, to project self proclaimed homosexuality, child molestation; or, ther crime. This technique is also used to extract data from others.
[19] TMTM [Transmogrificatoric Transmaladmixturaton] processing. This involves admixturating a target; by spiritual rape of the target, to kill a target with incompatible energies that will eventually; if not immediately, kill the target. It is a fatal admixturation.
[20] Finding data through conversation
[21] TOR Network Hackers: The operatives take total control over target's computers. They may monitor a home 24 hours per day; even if the computer is turned off.
[22] Using rapists and child molesters; as well as juvenile ex convicts for operations.
[23] BB Gun and rival Pellet Gun operatives. These groups are street warfare gangs. The BB gun groups are corrupted; with the exception of the female leader. The Pellet gun group leader is corrupted.
[24] Most gangsters are similar to Vegan Gains of the YouTube.
[25] A special Mafia that locks up witnesses in houses. They torture female and child hostages with lack of food for up to 7 days, if the hostages do not obey them. They also hold hostage the world's highest intelligential targets that pose threats to them. These targets are used to provide data to psywar operatives.
[26] The operatives use computers to monitor minds on the Internet. The computers are EMOTIV EPOCH mind control devices used to control extrinsical devices by mind.
[27] Utilizing redirection from targets by white noise covering houses to prevent any ssignal or voice from going into or out of buildings and homes. Shadow sounds [sounds from torture buildings[] are projected onto target homes.
[28] Panic programming
[29] Cannabalistic programming.
[30] Hyperenergization of emotions by electronics.
[31] Admixruration of targets during masturbation of one or more targets my technique].
[32] Masturbation linking by utilizing masturbation to hyperenergize spirits and minds during telepathic sexual rape and admixturation [ my technique].
[33] Propaganda Psywar: Operatives blame targets for numerous criminal operations; such as rape, child molestation, homosexuality; and others, to entrap potential targets from learning truth regarding operatives. This technique causes innocent victims to blame witnesses for operations of criminals.
[34] Using child rape for slavery of parents and other adults; or, to blame adult targets for the crimes.
[35] "Evil Eye" direct linkage onto a target person's brain by telepathic linkage.
[36] Using "Defenders" to "Protect" citizens. These people are psychotic gangsters who kill targets.
[37] Utilizing 2 or 3 operatives that are opposite in "character" to see who a victim will be inclined to follow.
[38] Breaking into homes and moving items around.
[39] Hitting on windows, yelling at homes; and calling threats from a distance.
[40] Dumping wild animals near a home.
[41] Using homeless for experiments in "Red Rooms".
NOTE: MOST of these operations were taught to criminals by government defect operatives in the 1980's.
To be continued

Thursday, August 18, 2016

Electronics Laws

In the United States, there are laws regulating electronics transmissions. Here are 2 major laws:
[1] Eavesdropping: If anyone utilizes electronics to monitor sounds within a person's home, it is a felony.
[2] Invasion of Airwaves: If anyone transmits any sounds into a person's home, it is a felony.

Wednesday, August 17, 2016

"Gang Stalking"

Presently, gang stalking is used; by government defects, to Link people onto a target and cover up data and spirits being stolen from the target.
This is the procedure:
[1] An electronics device sends mental data to a targetted person; such as a street person. The street person is a filter for data.
[2] A street person receives data while a second electronics receives data from him/her.
[3] A second electronics receives data; and sends it to a computerized system.
The target is reverse programmed into the target street persons data; such as mind control states, hypnosis; and criminal data.
The target #2 does not care if they are blamed for operations. MOST are ex convicts.
The electronics operatives strip data regarding personality and other data; and use it as a weapon by ex convicts to take people away from the target that would trust him/ her; and kill or destroy them. This is a form of artificial telepathy utilizing electronics. This technique has been used since the 1960's.
Satellites of the Counterintelligence defect groups can track and record the total historical data of almost any person's mind.
Defects include:
[1] Melissa"L She is an Intelligence Agency defect in charge of cannabalism and homosexuality.
[2] Lt. Colonell Reidel: Marine Corps Counterintelligence Agency Defect.
[3] "Agent Patry": Russian KGB Defect that is utilizing Agent Patry of the FBI for entrapment.
There are numerous others; but, these are the MOST Predominant.
Operatives have learned from me how to telepathically duplicate electronics and their effects; as well as utilize ANY other electronics for hyperenergization; and use.

Electronics Warfare and Other High Level Crimes

Many high government crimes have been committed since early days. Of these crimes are:
[1] Electronics/ Satellite warfare and operations: These are designed for mind control and termination; as well as destruction of the body. Electronics may perform many operations which include:
  [1] Mind Control and reprogramming
  [2] Termination of mental capacitance
  [3] Disintegration of the entire body.
  Satellites may also reprogram huge quantities of people simultaneously.
[2] Termination from Society: This is accomplished by:
  [1] Slavery by Mafia Slave Trade Groups
  [2] Direct Killings
  [3] Chemical Warfare: individual targets
  [4] Biological Warfare: Individual targets.
  [5] False Prosecutions: Usually for governmental cover up.
  [6] Psychiatric Unit Debriefing: prosecuting targets into psychiatric units for shock treatment debriefing.
  [7] Hiring Potential Threats for government operations; then, allowing them to take blame for operations.
  [8] Propaganda Psywar Operations: Utilizing large groups to accuse a target for criminal operations.
      This Includes:
      [1] Homosexuality: Jeffrey Dahmer was blamed for that.
      [2] Drug addiction or sales
      [3] Child Molestation with terminated operative "Witnesses"
      These operations separate targets from the society, government, friends, and relatives. This allows the
      friends and other people to be used as weapons against the target. Total termination of credibility, trust,
      cooperation; and other functions allows "Safe" termination of a target.
[9] Obama's Hackers Rumour:
     I am not familiar with any trojans in computers by Obama; in fact, ALL companies terminate every trojan. Windows and Linux Operating Systems track everything you do on a computer. Hackers track everyone also; that is usefull. Professional hackers NEVER use trojans, viruses; or other parasites, in computers. They can take complete control over any computer; even when it is turned off; then, gather every data in the computer within a few minutes.
NOTE: Unless a program such as Wise Disc Wipe, forensics systems; or other system, ALL data on a computer is retained; even if it was deleted. ANY deleted data can be located and recorded..