Monthly Archives: June 2012

Could some British nationals visiting the USA be at risk of becoming targeted individuals from criminal operations?

I have heard reports that a pattern is emerging regarding British nationals visiting North America, who have become targeted individuals, mainly as a result of criminal operations in the Los Angeles area.  I know of several cases, including my own, where this happened.  What is disturbing is that in some cases this activity followed British nationals back to the UK.  In one or two cases, family members or contacts in the UK were also affected.

Those in the UK visiting the US, particularly the South West, may wish to let the Foreign and Commonwealth Office know in advance.  The FCO’s routine advice is to ‘Register with our LOCATE service to tell us when and where you are travelling abroad or where you live abroad so our consular and crisis staff can provide better assistance to you in an emergency’.  That way, if anything happens to you, at least they know where you were, your due date of departure and contact details.   See ‘General Registration’ under

If you are targeted while in the US, let the FCO know.   It is as well to be aware that targeting of individuals could continue even after you return to the UK.  If you notice anything unusual that makes you suspect that you are still being targeted – see the section in my ‘Home’ post ‘Are you a targeted individual?’, you may want to update the FCO on that as well.  For example, if your internet communications or electronic computer connections appear to be behaving strangely.

It may be that visitors to the US from other countries are having similar experiences.  The more information that is made publicly available about the extent of criminal activity, the more likely it is that perpetraitors will be apprehended.

This post is also available at

Other posts are available at

PerpeTraitor profiles – the low down

Targeted Individuals (TIs) have been, and continue to be, the victims of unspeakable atrocities, and some have lost their lives.   The technologies involved have been available for a long time now.  For example, as early as 1969 Dr Jose Delgado, a Yale psychologist, was showing how electrical stimulation of different parts of the brain resulted in changes in breathing rhythms and heartbeat rhythms:-

To judge by the number of TIs reporting what has happened to them, there must be many criminal perpetraitors.  The number of TIs can only be estimated, but some indication may be drawn from a petition started in 2007, calling for a ban on electronic warfare on civilians  –

To date the petition has received over 1500 signatures, mainly from those describing themselves as TIs.  While numbers of signatures can only be indicative, there have clearly been ongoing issues since 2007.  Even one TI is one too many, but the petition numbers are probably only the tip of the iceberg.  The significant increase in 2011 and emerging figures for 2012 raise serious questions. Greater publicity for the petition might be one explanation, but I only discovered the website by chance this month, and I never saw any publicity for it. The testimonies of some of the signatories are heart-rending.

Signatures supporting a ban on electronic warfare on citizens from          2007-2012.  Source:
What kind of person would routinely torture targeted individuals on a daily basis using electronic harassment and synthetic telepathy?  From the time that I became a targeted individual, I was obliged to interact with some of these people.  They used synthetic telepathy to talk to me – for an explanation of this see, and they sounded like any normal human beings you might meet in any street or office, except that they were abusive, cruel and manipulative. People said the same thing about staff working in Nazi death camps.  They went home at the end of the day to be with their families, and neighbours had no indication of what they were involved in.
This blog looks primarily at aspects of perpetraitor psychology and technology.  But while going down that route, we must not forget that the perpetraitors’ role is to operate a range of targeting devices that deliver torture to the body of the victim, and can cause cancer, heart ailments and malfunction of physical organs.
Who are the PerpeTraitors?
For some months I was obliged to live as if in close quarters with perpetraitors 24/7.  During that time I observed their behaviour, and it seemed to me that they fell into four categories:

–  Experienced criminal operators

–  “Old lags” – disgraced law enforcement / security officers, who may have     criminal convictions

–  Younger criminals with state-of-the-art ITC skills

–  “Les Miserables” – young kids, mainly women, who may have been targeted, or exploited or who got into something they didn’t understand.

Perpetraitors can listen to your thoughts, and their equipment allows you to hear their voices – but not their thoughts. The range of technologies that may be used are described at:

One of the things they don’t tell you is that synthetic telepathy can become more of a two-way process.  Based on my experience, if they can hear your thoughts, over time you can begin to build up a picture of what is going on at the other end of the ‘phone’, both aurally and visually, using the same equipment that they use to spy on TIs.  During the initial phases of targeting, the picture I began to build up was of a large room, one wall of which was like a plasma screen.  Information about each TI was displayed in series on the screen.  There were technicians, using automated software to manage the daily caseload of criminal interventions used to target each individual. It felt like a secure data centre IT environment, with staff quietly going about their daily tasks. Perpetraitors were anonymous, hardly interacting with me, though sometimes I heard them talking to each other.  What were these people like, I wondered. I pictured several casually-dressed men in their middle to late thirties, sitting round a table, playing cards, while helping themselves to soft drinks and snacks.

Later on it seemed I was targeted by a smaller criminal outfit operating a mix of experienced and less experienced perpetraitors, usually working three shifts a day in pairs.  If the TI sleeps at night, one perpetraitor may operate alone, using programmed interventions in an attempt to manipulate TI dream states.

A number of TIs have described on the internet how they were harassed through ‘street theatre’ using standard scenarios.  In my case, the theatre was more economically produced using holographic visual software designed to work with brain communications technology, drawing on stock scenarios. The daily dramas required perpetraitors to interact directly with the TI and ad lib in line with TI responses, rather than follow electronic screen prompts. The different characters in the dramas were created using  equipment that can transmute voices into different personalities, a bit like a synthesiser, switching genders and age to suit whatever story they were telling. Perpetraitors displayed enthusiasm in preparing their daily shows.  No doubt there is a lot of boredom in their work.  I got the impression that some of them were wanabee Hollywood script writers and movie directors.  It is sad that people could fall so low, when human potential offers so much more.

Use of Satellite Technology

According to some researchers such as Dr John Hall –, satellite technology is an essential part of effective targeting of individuals. Even if TIs are a long way off – in a different country, for example, they can be located and tracked for targeting.  According to the website, ‘advanced satellite surveillance systems can be accessed by corrupt “businessmen”, including media and political figures. They can access audio-visual material as well as intercept telecommunications. The results can be used to rob, blackmail, harass or humiliate targets. Targets include competitors, researchers, writers, inventors, lobbyists, law enforcers etc’.

Another website reports that ‘Private criminals or corrupt government are tapping into and somehow gaining access to Government satellite technology using Remote Neural Monitoring and terrorizing individuals. It is claimed that this is being done illegally to individuals across the United States.

Commercial satellite technology is readily accessible around the world to those who can afford to pay for it.  ‘As to where demand is coming from, the United States is the dominant force in this sector, with a 30 percent share due to high-demand from NASA and the Department of Defence (DoD). Europe enjoys a 25 percent share, while Asia follows suit with 22 percent thanks to activity in China and Japan. Russia has a 13 percent share of the market, while the Middle East and Africa (MENA) tops 9 percent and the rest of the world follows with 5 percent’.

It occurred to me that criminals intent on satellite targeting of individuals might buy access to some of the many satellites offering commercial opportunities, if there was a high enough profit from what they were doing.   Some examples of the way that perpetraitors might profit targeting of individuals are listed in the section on ‘Money, malice and revenge as criminal motivating factors’ below.

Perpetraitor operations

Perpetraitors do not necessarily have that much real-time interaction with TIs, although the TI is meant to think that they are on the other end of the line all the time.  Often what is actually being transmitted is an interactive programme using Neurophone technology, which provides a running commentary on the TI’s thoughts and feelings.

‘The computer repeats (echoes) your  own thoughts and then the human monitors comment or respond verbally’ …’Whilst the live/human comments are individualistic and unrelated to the victim’s own thought processes, oftentimes the artificial intelligence involved will parrot standard phrases.  These are triggered by your thoughts while the human monitors remain silent or absent’.

The programme can call on automated prompts which provide negative feedback, based on the TI’s thought response. These comments may be accompanied by synthetic noises like mocking canned laughter, jeering, hissing, and conspiratorial whispering. The perpetraitors can switch to manual for real-time interventions.

It is possible for a TI to halt the operation of the running commentary in a number of ways. The programme relies on TI feedback to continue running, and if there is no TI feedback for about an hour the programme will switch off. Eliminating thought for an hour is hard to do, but there is a much easier way to throw a spanner in the works. The programme is interactive and responds to what the TI is thinking.  If you ask the system a question for which it does not have a programmed response, the system will stall.  What questions will stall the programme?  Well at the time of writing some of these might work:

  • Who are you?
  • What is your experience of…?
  • When was the last time you…?

If a targeted individual happens to have nothing better to do than provide open questions to the programme, the system will pack up eventually, owing to lack of TI thought input.

Perpetraitors like to make out that they are all-powerful and impervious to any risks.  Listening to them, I realised that they don’t necessarily know that much about the technology they use, or the potential risks to themselvesas well as to TIs whenever they tortured their victims.

Junior perpetraitors may be at risk of targeting by their criminal overseers, one of whom thought nothing of using torture weapons on one of his young female staff on one occasion.

Criminal bosses may have told perpetraitors that electronic equipment they use is perfectly safe.  But you cannot always rely on what people say about technology.  For example, some people said that TSA scanners posed no threat to the health of air passengers or equipment operators.  The EU took a different line and banned their use: and

Since then there have been reports in the US that some TSA operators are being diagnosed with fast acting cancers:

Perhaps perpetraitors are also at risk from the technology they use.

Some TIs are used as guinea pigs   

Some TIs report that they were experimented on for research purposes.  I had the impression that this happened to me too.  I am fairly sure that perpetraitors also used me as a subject during training of criminal recruits.

Altered states of consciousness leading to paranoia and psychosis appear to be the main means of gaining control over TIs, so research might be expected in this area.

Perpetraitors were trying out different approaches, focusing on psychotronics to deliver altered states of consciousness.  It felt as if they were trying to make me inhale something like chloroform or carbon monoxide. Other criminals sometimes joined the perpetraitors in what seemed like a virtual chat room, to study the effects of new approaches on me.

According to Dr Carole Smith, PhD, in ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’* asphyxia can be induced by altering frequencies in the brain that control breathing.  Perhaps other altered states of consciousness can be produced in a similar way.  I have found that going out into fresh air greatly reduces the impact of synthetically induced breathing problems.

On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’, Journal of Psycho-Social Studies, 2003.

Money, malice and revenge as criminal motivating factors

Perpetraitors try to conceal the reason why TIs are targeted.  It was a while before I realised that at certain times, those torturing me were worried about meeting some delivery deadlines linked to incentive payments.  Perpetraitors were strongly focused on:

  • meeting  set levels of activity using various types of equipment
  • delivering a different drama every day
  • demonstrating that I was deprived of sleep for a specific number of days
  • ensuring a steady flow of interactions with the TI throughout their particular shift.

If the end of the shift was approaching, and targets had not been met, perpetraitors became tense and morose.

Why are the criminals doing it?  The short answer is that they do it to earn a living.  The objectives may vary, but I have read of reported cases where a “client” requested the criminals to deliver specific outcomes in exchange for payment.  Dr John Hall explores this in his book ‘A new breed: satellite terrorism in America’, 2009. Outcomes might include:

  • Changing a will in favour of a client
  • Beak up of a marriage
  • Constructive dismissal of a TI
  • Getting a TI to sell property  to a client at an advantage price
  • Forcing a TI to leave a particular neighborhood.

Other cases recorded on the internet suggest that criminal perpetraitors or their clients, motivated by jealousy or revenge, tried to have targeted individuals assassinated remotely, for example by a fatal stroke or heart attack, or arranged to have a member of a TI’s family hurt in some way.

I know of one particularly distressing case in which a couple visiting North America were targeted during their stay, and one of them was hospitalised with a life-threatening illness.  At the same time, it transpired that the elderly mother of one of them, living in their home country, was suddenly diagnosed with paranoia and psychosis, and sectioned.  Clinicians carried out extensive checks, as she had recently had a routine operation, but could find no cause of the change in her mental health. The attack on the helpless elderly mother was a cowardly despicable act of criminal exploitation motivated by malice.

How would perpetraitors feel if their own mothers were being treated this way?Perhaps perpetraitors are not capable of experiencing human feelings.

Revenge played a part in my becoming a targeted individual. Listening to perpetraitors talking among themselves I identified one of them – falling into the ‘old lag’ category, as having a grudge against my employer. I later learned the initial justification was the amount of overseas travel I did.


In his book ‘A new breed: satellite terrorism in America’, Dr John Hall states that perpetraitors use satellite surveillance equipment hacked into by criminals, to see what TIs are doing in their homes.  Some TIs report that perpetraitors are with them wherever they go, and comment on what they are looking at – This has been my own experience.

A number of other TIs report having similar experiences:

What technology would enable perpetraitors to look through my eyes?  It occurred to me that it might work a bit like a television. Most kinds of television work from the same basic principle as the eyes and the brain. The tiny dots of light produced on the TV screen, called pixels, flash according to a specific pattern provided by the video signal. A person’s eyes transmit this pattern to the brain, where it is interpreted as a recognizable image.

Remote Neural Monitoring is said to be used by perpetraitors to send images direct to the visual cortex of a TI, bypassing the eyes and optic nerves, to create optical illusions –  So presumably it could receive images from the visual cortex in the same way.  This would mean that perpetrators could use Remote Neural Monitoring to see what the TI was seeing.

Are there tactics that TIs can use to provide appropriate feedback to perpetraitors? There are sound frequencies that perpetraitors do not like, because of the way psychotronics works, including:

  • Rustling and crunching of cellophane, supermarket plastic bags and tissue paper.  The noise should be made loud and close to the TI’s head.  Do not be surprised if the perpetraitors temporarily turn off their communication links. Yes, they can turn the links off, and they will turn them back on a bit later.
  • A similar effect can be achieved by scratching cutlery on ceramic plates.
  • High pitched frequencies such as those played on Solfegio tones – from are also effective.

Strange as it may seem, there are repellent images that perpetraitors do not like thrown their way.  If they express interest in something revolting, call their bluff.  Create a strong visual image of what they are focused on – or something equally revolting – and send it back down the psychotronic line, visualising it falling all over them.  From what I have read, their equipment can show mind pictures on a screen, so you can provide both mental and visual feedback.



Mask images taken from:

This blog was published despite repeated attempts to interfere with my computer display drive function, and alteration of the text.  Apparently, this can be achieved using satellite technology remotely – from another country for example.

Perceptions of a targeted individual

Every targeted individual’s experience is unique to them. From what I have read, there is quite a range of recorded personal case studies, across a number of countries. In spite of this, most people are still unaware that remote anonymous physical and mental torture could already be destroying the lives of neighbours and colleagues. Many people – myself included, may not be up to speed with developments in advanced technologies that have the potential not only to help but to harm.

The more that people recount their experiences, the easier it is for others to understand what electronic harassment and technologies such as synthetic chemical frequencies and remote electronic neuron-communication – synthetic telepathy – are about. The more that victimization of targeted individuals is discussed and brought into the open, the more it helps to promote an effective official response at national level to tackling what is now an international issue.

Early signs

It was some time before I realised that anything was happening to me. But looking back, it must have started about September 2011 while I was visiting another country. I noticed that sometimes when I was out walking, the ground felt as if it was rising and falling like waves. At first I put this down to vertigo from too much air travel, but now I suspect that it was the effect of intentionally directed EMF equipment.

A couple of months later, I noticed that when I sat in particular chairs in my home, my lower back began throbbing. I put this down to nearby road and railway activity. One midday, I felt tired and fell asleep for about an hour. When I woke up, I was disoriented, and noticed what seemed like a needle mark on my hand. I wondered how it had got there, and I photographed it – see picture below:

After that nothing untoward happened till on 28 December I returned from spending Christmas with my mother to find the front door of my flat unlocked.Nothing had been taken, and I assumed that I must have left it unlocked by mistake. Much later I learned that this can be an indication that criminals have visited a property to set up tiny communications devices such as transmitters and wireless cameras.

When things really started

That night I felt waves of energy spreading across my body, sudden temperature increase and stabbing pains that seemed to be externally driven. On waking I could hear two people, a woman and a man, talking to each other. The voices were in my head, and they were discussing what they planned to do to me. They seemed to know each other well, and their own plans for the day – coffee, leaving early – were interspersed in the conversation. I realised they were already at work, and that they were working on me.

There was a scenario for each day. Typically during daylight hours there was a cocktail of energy waves, throbbing and stabbing pains, taped feedback of my thoughts mixed with interjections that did not come from me, endlessly playing on an interactive feedback loop, lethargy and concentration loss. As the evening drew in, the external intruders would enact a play in my mind – with me in a leading role. There might be several characters, with different voices, but over time it became apparent that one or two individuals sitting at a terminal screen, safe from detection, were acting all the roles, assisted by voice synthesizers and screen technology.

Perhaps the plays were drawn from a stock library and modified (or not) to fit my supposed circumstances. Often I had to smile at the ludicrous plots enacted. But it didn’t matter how bad the performance, as no one was watching or supervising the perpetrators. Here is a typical scenario:

A company making adults movies are in the middle of filming when the female lead dies.  They need someone who looks or sounds vaguely like her as a stand-in for certain scenes.  I am supposed to cooperate in acting out those scenes under their direction, and to say certain phrases so that the movie can be used to blackmail an undisclosed target.  The scenes are shot in my living room and bedroom, where I am led to believe they have wireless television cameras installed.

As a senior citizen, I can only wonder at the quality of their background research, but my age didn’t bother them. Most of this drivel washed over my head, but what did concern me was the accompanying experience of breathing difficulties seemingly from the effects of synthetic chemical frequencies – and fast, heavy heart rate. The perception of inhaling chemicals brought on apparent psychosis in which I felt like a two-dimensional character in a weird computer game.

PerpeTraitors Freudian Slip?

One of the scenarios enacted by the perpetraitors reflects themes portrayed in American films: 

The targeted individual emerges in a backdrop like a scene from the Matrix full of strange tunnels and complex wiring, and finds that everyone is being slowly tortured remotely by a computer.  The computer was originally programmed by a criminally insane psychopath, who died some time ago, but no one now knows how to access the code to re-programme the computer.  The targeted individual must try to find the code and re-programme the computer.

What is interesting about this one is the tacit acceptance that automated electronic harassment and mind control are the products of criminally insane psychopaths, and that any sane person will wish to put an end to such activities.

How I got rescued

One night I lost consciousness. When consciousness returned, I felt as if death might be near. My one thought was to say goodbye to my mother, so I got up and travelled to where she lived. The breathing difficulties continued and my mother helped me to call the police. A wonderful police officer came round immediately, whose presence brought an abrupt end to my attack. Ambulance staff soon arrived. They seemed well briefed about what was happening and produced electronic records of physical checks. I was greatly heartened by the response of the support services, who took me seriously, despite the difficulty in providing evidence of what was happening to me.

Next day the perpetrators returned to their work; but a few days afterwards there was a noticeable change, as if someone had pulled the plug on them. I am aware that they are still trying to re-connect, and have redoubled their efforts since I began writing my blog.  To date they have been unable to reach me effectively. I am grateful to my rescuers, whoever they may be.

Dedicated to victims of electronic harassment and psychotronics




If you are a victim of electronic harassment, you are not alone.  The number of targeted individuals recording their experiences on the internet is steadily increasing, and there are victim support groups in several countries. The technology used by criminals is derived from military applications, and security constraints have impeded the development of measures to deal with perpetrators. Governments in some countries are now working to produce legislation that will enable them to bring perpetrators to justice.  They face the challenge of providing law enforcement officials with sufficient power to respond effectively, while preserving the freedoms of law-abiding citizens.  Despite slow progress, there is evidence of greater openness in acknowledging the threat to individuals.  Mainstream media are starting to report these issues.  See extracts from the BBC below:

1.  On 10 April 2012 the BBC technology correspondent, Mark Ward, reported:

‘Warning over medical implant attacks:

Many medical implants are vulnerable to attacks that could threaten their users’ lives, according to studies. Security researchers have developed attacks that locate and compromise implants used to manage conditions such as diabetes and heart disease.  One attack identified a radio signal that, if re-broadcast, would have switched off a heart defibrillator.  Researchers say more work needs to be done to secure implants and protect against malicious actions.’    

2. On 1 February 2012 the BBC science and technology correspondent, Jason Palmer, wrote:  ‘Science decodes ‘internal voices’:

Researchers have demonstrated a striking method to reconstruct words, based on the brain waves of patients thinking of those words.  The technique, reported in PLoS Biology, relies on gathering electrical signals directly from patients’ brains. Based on signals from listening patients, a computer model was used to reconstruct the sounds of words that patients were thinking of…

Several approaches have in recent years suggested that scientists are closing in on methods to tap into our very thoughts…  A technique called functional magnetic resonance imaging to track blood flow in the brain has shown promise for identifying which words or ideas someone may be thinking about.’

3. Also on 1 February 2012, the BBC Radio 4 Today programme ran a feature called:  ‘Is this what thought sounds like? 

Scientists believe the first step has been taken towards hearing imagined speech using a form of electronic telepathy. They hope that, in the future, it may be possible to “decode” the thoughts of brain-damaged patients who cannot speak. Bob Knight, professor of psychology and neuroscience at the University of California, explains how it works.’

4. On 12 May 2012 the BBC drew attention to the role of Long Range Acoustic Weapons in crowd control: 12 May 2012 by Gavin Thomas BBC News:

Sonic device deployed in London during Olympics:

The Ministry of Defence has confirmed a sonic device will be deployed in London during the Olympics. The American-made Long Range Acoustic Device (LRAD) can be used to send verbal warnings over a long distance or emit a beam of pain-inducing tones.’


If you are a targeted individual, you need practical help now. The good news is that there are simple things we can do to protect ourselves and move towards a more normal life without spending a lot of money. Many targeted individuals have shared their tips, and a number of them are listed on this site. I have added what I find works for me.


WHAT IS ELECTRONIC HARASSMENT?  Electronic harassment is criminal use of frequency wave technologies  to inflict pain and physical discomfort  and to project voices within the head of a targeted individual – referred to as “voice to skull technology” /psychotronics.  Some targeted individuals have died as a result of these attacks.

Technology typically involves satellite surveillance systems combined with thermal, infrared and X-ray imaging devices, ultra-low frequency broadcasts and microwave transmissions.  Some victims may have implants to track them and act as receivers for voice transmissions, although synthetic telepathy can work without them. Tiny wireless television cameras may be hidden in the homes of victims, and in some cases used for blackmail.

ARE YOU A TARGETED INDIVIDUAL?  The effects of electronic harassment are similar to a range of physical and mental health concerns.  Targeted individuals may not be aware that what they are experiencing is caused by malicious criminal activities.  Physical effects may include:

Mental effects may include:

A very clear detailed account of the personal observations of a targeted individual of mind control and synthetic telepathy, written by Lily Morgan, is at I strongly recommend this post for those wanting to understand what targeted individuals have to go through. In future blogs I will record my own experience as a targeted individual, and to discuss relevant issues relating to electronic harassment and psychotronics.