Tag Archives: Satellite technology


There are a few things I wanted to say about developments affecting Targeted Individuals, from my
perspective.  Everything I refer to is in the public domain, and no doubt much more will be flooding
out over the coming weeks and months.


We all know about US mind control experiments and the bad things that went on in the 1950s after the second world war, the cold war, Vietnam and more recent developments. After Vietnam, which used conscripted US troops, the Targeted Individuals began to appear, but it was not obvious to everyone where that was going.

Picture opposite: Peasants suspected of being Vietcong under detention of U.S. army, 1966, en.wikipedia.org/Wik/Vietnam_War

‘Thousands of American citizens have been publicly claiming for years that they are under attack from directed energy weapons that attack their physical bodies, and their central nervous systems. Hundreds of websites have sprung up on the internet and these distraught and tormented people have banded together in numerous groups seeking redress and relief from their elected representatives. They have brought legal cases to trial in both the United States and in international forums on human rights. Human rights activists have been besieged by them for help, but all such petitions, and court cases have run up against the problem of a lack of physical evidence. The entire judicial system is built upon the concept of physical evidence and people who are being attacked with invisible bullets are left with none’. Source: Marshall Thomas – Monarch II  -Victims.pdf http://www.monarchnewphoenix.com/

At first it seemed to be some sort of internal problem for one nation state. But with so many international groupings, special friends clubs etc, it was not appreciated at the time that there could be an international dimension that did not represent any nation state and transcended national boundaries.


No nation state, whatever their political structure, wants to give their power away to an invisible enemy. That’s what defence and military intelligence are meant to deal with. But most human beings tend to assume that there are standards, ethics, boundaries that they and others would not cross, and that even within defence organisations they would be able to spot anyone who didn’t share those standards.

But what if there was a technology that could capture people invisibly, not just brain-wash them, but impose subtle re-wiring on their brains and in some cases squirt somebody else’s mindset onto them. Those programmed individuals would then be released back into their environment to engage in every-day life under remote control.

Whether or not perpetrators interacted with TIs thereafter, they would use them in any way that served their purposes, as:

  • unwitting spies on others, recruiting more Tis,
  • unwitting sleeping activists
  • non consensual research subjects for all kinds of weapons research, including research on methods of torture.
There is a theory that if a group of 2000 strategically significant people in a country are taken
over, supported by a number of tactical people also targeted, the country is vanquished by default.
This stealth method relies on invisible electronic weapons. But the plans failed. In the new
scenario, perpetraitors’ bosses may begin to focus on TIs as hostages, in the hopes that
negotiation might be a possibility.
Perpetraitors were not told that at first, but now they know, and they are treading water, waiting for
new instructions that may never come, while those that managed to leave the sinking ship
negotiate their exit visas.
Picture opposite, courtesy of  Project Gutenberg – free ebooks www.gutenberg.org/
How could all this happen without governments
finding out? Well the mafia has always been in
town, and governments were always aware of
that, but no matter how senior an elected
representative may be, they are still individuals,
with loved ones.At first, the implications of invisibility technology for ‘virtual’ abduction of targeted
individuals may not have dawned on everybody immediately. But by now, you can be sure the
implications of what has been going on definitely have dawned on everyone.


If you worked for a nation state in an international grouping of national representatives, perhaps in the area of intelligence and security, the last thing you would want is for your country, your town, your family to be taken over by some ghastly group of nasties. Even allowing for diplomatic niceties, you would soon be networking with others who didn’t like what they saw either. The threat would be identified, assessed, and other arrangements would be put in hand to ensure the defence of the nation and protection of loved ones. And increasingly, that is what is happening.


The plan relied on major covert initiatives in a large number of other countries. But in practice it was never going to work on residents of other countries, because the system required gang-stalking – physical threats and brutality to support invisible weaponry. And that is too hard to arrange across the world on the scale necessary to ensure success, particularly when people realised that collaboration did not buy protection.


No one now thinks that war is the answer to problems that have blighted human life throughout history. Particularly when traditional weapons of last resort are no longer operational for wartime purposes. The diplomatic approach is containment and isolation, disentanglement from old out-of-date treaties, reduction in shared information, building of new bridges elsewhere, and development of feasible new technologies to keep the nasties out.

This in my view is what has been quietly going on, and already many people have turned their face
towards new objectives that offer real prospects of a better life for everyone while providing an
effective defence system. I say defence, rather than attack, because the old belief that attack is the
best method of defence no longer applies, if it ever did. If you have a system that will stop invisible
weapons:- electronic, radio, light, sound, atomic, particle or other systems, from reaching your
country or its people, that is a good start. And this is now happening.
How can we tell it is happening? Well for one thing, the flood of technical and scientific information
that is appearing in the mainstream press indicates that there is now greater freedom of
information. See my previous posts for details of what is now being openly reported. Gone are the
days when you had to scour the alternative media for hints of what might be going on. And this is
reflecting recent well-publicised changes in control over the media at international levels.
What is being reported now  includes incredible advances in science, particularly weapons
technologies.  Less is being discussed about measures to counter such weapons, but measures
do exist, and information about them is available in the technical media, for those who know where
to find it.

If certain insane plans had gone ahead unobstructed, one day, everyone would be a Targeted Individual. There is a beautiful part of Utah called ‘Zion National Park’, but the beauty of that part of the world, and some others, was smeared with a terrible stain – torture, cruelty, insensitivity to life and crimes against humanity. Some people made a link between what was going on there and the 2012 Olympics… but the 2012 Olympics were planned long ago, and many things changed, in ways that perpetraitor bosses had not predicted.

Some people thought that the 2012 Olympic Games would signal a special event that finally announced to the world what supposedly many people would already know – that key players and elected representatives across the world had been vanquished by an invisible enemy, and that a fait-accompli had been achieved, not through war but through stealth and invisible weapons. BUT IT DIDN’T HAPPEN. Why? Because most countries wised up to what was going on long ago, and took sensible preventative action.

‘The Games present an attractive target for our enemies and they will be at the centre of the world’s attention in a month or so. No doubt some terrorist networks have thought about whether they could pull off an attack. But the Games are not an easy target and the fact that we have disrupted multiple terrorist plots here and abroad in recent years demonstrates that the UK as a whole is not an easy target for terrorism. The national threat level at present is assessed to be SUBSTANTIAL – meaning that an attack is a strong possibility – one notch lower than has been the case for much of the last ten years. We are far from complacent. A lot of hard work still lies ahead and there is no such thing as guaranteed security. But I think that we shall see a successful and memorable Games this summer in London’…
‘The security preparations for the Games have been long and thorough. Members of my Service have been involved in advising on the physical design and security of the sites, but also in the accreditation of those working at the venues and in ensuring that intelligence collection and analysis for the security operation can meet the increased demand. This is not a solo activity. We are working as part of a mature and well developed counter-terrorist community in the UK and with the close support and co-operation of friendly Services overseas, who have been extremely generous in their assistance. We are also anticipating an Olympic security legacy after the Games – better intelligence coverage of potential threats, better integration at the local and national level of security and intelligence effort, and new, closer and better developed intelligence co-operation at the international level. I hope and expect that this legacy will live on well after the Games themselves have closed.’  
Source: THE OLYMPICS AND BEYOND, Address at the Lord Mayor’s Annual Defence and Security Lecture by the Director General of the Security Service, Jonathan Evans. Mansion House, City of London, 25 June 2012
‘More than 1,000 troops who had been on standby to bolster security at the Olympic Games have been deployed. Culture Secretary Jeremy Hunt said the 1,200 troops were to be used because ministers were clear that “we don’t want to leave anything to chance”…The move means 18,200 troops have now been deployed to the Games.’ http://www.bbc.co.uk/news/uk-18966360.

‘The shadow of terrorism has hung over the Games for a reason. The day after London won its Olympic bid on 6 July 2005, suicide bombers struck the city. After that, everyone knew these Olympics would be the first to be held in a “high threat” environment’…

‘The number of players involved in delivering what has been called the largest peacetime security operation in British history is certainly bewildering.’..Critics have asked whether the security is all too much, pointing for instance to the missiles on rooftops in east London. Would they really be used?’ … 
‘There is a secret chart locked in a drawer somewhere in Whitehall, another of those involved in security tells me when I ask that question, which plots with clinical detail how many people would die if an airliner crashed into the Olympic Stadium’…  http://www.bbc.co.uk/news/magazine-18923741
First of all, potentially everyone is a targeted individual.
There are particular problems for people living in the United States, though much has been going
on behind the scenes, with help from the international community, to stop further erosion of
internal and external national security. Some living in the US may smile wryly at the apparent
naivety of such a statement, and I understand why. But believe it or not, the nasties are actually on
the run. No you may not notice any change yet, but you may be one of the lucky ones who do.
If you live in a country in Europe, or some other places which have certain foreign bases permitted
within your national boundaries, you will have been allocated to an overseas perpetrator
‘supervisor’ for potential targeting. The way that works is that every country is divided up into
rectangles, and a perpetraitor unit using hand-held devices that can be carried in a small suitcase
is given charge of that area. They can’t target everyone, but they planned to focus on individuals
who might play a tactical or strategic role in their unfolding strategy.

That is bad enough, but what if a dividing line between one rectangle and another happens to fall between houses. And what if perpetraitors are not too fussy about who gets caught up in the beams they direct at Tis. There may be an overlap. That could mean that people get targeted twice by different units on a daily basis, and that others living in those houses may be affected.

Not all perpetrators can be bothered to do precision targeting of energy beams. This can mean that birds, bees, animals and fish may be affected. Where I live, birds can be seen dodging the microwaves to get to the food table. Only one song-thrush has fallen to the ground dead so far. But perpetrators don’t like our birds singing in the morning, because it isn’t morning for some of them, and a few of the louder birds have received personal attention from the perpetrators.

Recently I was rescued from a microwave
attack that began to affect not only people
where I live, but anyone in my vicinity. Hard-
working rescuers had jammed the perpetraitors’ signal, reducing their synthetic telepathy to a
murmur. In an attempt to counteract the jamming and recover their investment, the dim-witted
criminal perpetraitors exposed me and anyone near me to a 36-hour dose of microwaves with
enough power to support a large town, or fight a small war.
People walking towards me would suddenly lurch sideways as the illegally imposed
electromagnetic field surrounding me attempted to pull them into its ‘orbit’.  That type of microwave
beam does many things, including wiping short-term memory. So the memories of some
individuals in my vicinity may have been temporarily affected, not to mention credit card machines
in shops, bar-code readers in supermarkets and electrical circuits.
I tried to buy something in a shop using a debit card, and they had a power cut. Then it turned out
that a whole area of shops had a power cut. So we just had to go home. Luckily it was lunchtime…
But it was more disturbing when I went to a supermarket check-out one night, and the poor
gentleman at the till was so phased by the microwaves, that he couldn’t remember what he was
doing and asked me the same questions twice. He tried to input some bar codes but they didn’t
work, and a supervisor had to be called. At that moment, my perpetraitors realised their slip was
showing, and reduced the power for a little while.


From what I have observed so far, the plan for targeted individuals was intended to be that:

1. Strategic and tactical targets were identified.

2. TIs were prioritised in terms of threat or usefulness to the enemy.

3. Those with sufficient priority were assessed for viability, and if considered suitable, were given
tracking implants, and some mapping of brain and body neurology etc.4. There may be a long
backlog of such cases, but at some point, a TI gets to be called into the operating theatre, where
retinal camera, internal viewing screen, and communication wiring are implanted, using laser eye
surgery techniques, along with other things. How this is done I leave you to figure
out…Technologies for fast skin repair, using artificial tissue and skin as well, ensure that implants to
body parts fade quickly, and go unnoticed. But I had one double implant which took 8 days to fade.
I’m sorry if the picture below is harsh and crude, but it was taken shortly after I began to be
targeted. I woke up one day and found this mark on my leg.

Apparently, under terms recently negotiated, the new perpetraitors’ guidance manual says that TIs
should be asked – presumably telepathically – whether they are willing to work cooperatively with
the perpetraitors. This may be have a bearing on future international arrangements affecting how
TIs are identified and rescued.
Previously, this never happened, as far as I can tell, and perpetraitors were under the impression
that they should conceal the purpose of their torture activities from individuals. But now they are
supposed to explain to TIs that they are potential recruits to the invisible cause. So if you hear
them ask if you want to do something, that is your opportunity to make it clear to any independent
reviewers, or as a record on any perpetraitor recording systems or other recording systems, that
you declined to work with them.
Of course perpetrators don’t take no for an answer, and they prefer to make offers you cannot
refuse, linked to well being of loved ones. But they target those anyway, so don’t be fooled. In
practice, TI negotiation cannot happen with perpetraitors as they are all chipped, mind controlled,
and on incentives to target so many more TIs per week/month. The torture targeting is partly to
make TIs do what they want, but also because they want to research how best to torture people.
And Tis will get that whether they say yes or no.
If, despite electronic torture, TIs don’t cooperate, they may not be aware that the re-wiring has
happened. They may not be aware that others can see through their eyes, take pictures of what is
seen, and create visual and auditory hallucinations in their brains. They may at times be ill, lose
their jobs or relationships, or retain both if they hold strategically important posts. They may not
realise that the same thing is happening to their loved ones.
If Targeted Individuals do realise what is going on and resist, until recently, they were destined to
follow a familiar route –  torture, research and termination, depending on how much research
money they could bring in for their criminal perpetrators.  However, TIs are not noticeably dying in
large numbers these days, whereas the prognosis for perpetraitors is increasingly sombre.


To be effective, declining the perpetraitors’ invitation to collaborate must be loud, clear, capable of being picked up by a third party, and of sufficient duration that if a record is wiped it shows up on some other system. I have found that telepathic repetition / thinking of ‘Out demons out’ for a few minutes works quite well. Perpetraitors know there is a risk they may be monitored by international law enforcement groups and they take a coffee break.

There is a song from the 1970s by Edgar Broughton Band which includes chants of ‘Out demons out’- not for everyone as it is raucous, but its at:

It appears that perpetraitors are currently using me as one of their cases for training recruits on
how best to to make Tis do what they want, amongst other things. That really is adding insult to
injury.  Based on what I have observed, selection criteria for perpetraitor recruits must be very
esoteric, as intelligence, perception, knowledge of current affairs and awareness of what goes on
outside the USA are not essential requirements.

UPDATE – 15 November 2012

The table below shows details of people who I believe or know to be targeted individuals, most of whom live or work close to where I live, or with whom I have had regular dealings.  The reported ailments are not surprising, given the ages of those concerned, and would not arouse suspicion, apart from the sudden onset of the symptoms in people who were generally in reasonable health and did not have a medical history of such health complaints.  Details that might lead to recognition of the individuals have been altered to protect their identities.

I would have been on the list except that I use various shielding methods that prevent perpetrators from achieving results that would enable them to claim financial rewards under illegal research contracts.  Rather than waste the investment in mapping and tracking my frequency indicators, perpetrators locked onto me every night and then went fishing in the surrounding area for potential research cases.  After an initial period during which mapping and tracking presumably took place, the ill-health problems began to surface, although I was not always aware of this.  The cases listed below may be the tip of the iceberg.

The two perpetrators concerned, David – based in the US and Philip – based in the UK, cooperated in targeting the individuals concerned. Each are known to favour particular methods.  David uses infrasound cavitation techniques, typically to achieve fast-acting bowel complaints.  Philip targets hip joints with harsh pain consistent with electronic weapons, possibly maser delivery.  Philip operates using hand-held devices that fit into a special suitcase.  There is a time delay between initiating an attack and its impact.  David’s electronic delivery system from the US achieves real-time impacts.  It would not be impossible to establish, retrospectively, whether perpetrators had targeted these individuals, if access was obtained to records of their electronic weapons usage.

Targeted Individual
Nature of Apparent Criminal Assault
Elderly gentleman over 90 years, former military background, electronics specialism, US contacts. 3 months ago, following one afternoon in my vicinity, sudden onset of confusion as in a stroke or Alzheimer’s, followed by weakness, and then sleep state almost 24/7.
Lady over 70 years May 2012 reported pain in one hip, hip replacement operation performed 5 months later, now reporting pain in other hip.
Lady over 95 years Found wandering in bewildered state January  2012, followed by onset of chronic bowel complaint that has not responded to treatment.
Lady over 60 years After 5 days in my vicinity reported bowel complaint –consistent with infrasound cavitation weapon attack,diagnosed as bowel cancer, successfully treated with chemotherapy. 8 months later, after further day in my vicinity reported complications.
Lady over 50 years January 2012, acute bowel pains for several weeks –consistent with cavitation weapon attack – followed by quadruple bypass.
Lady over 80 years Sudden unexpected onset of psychosis, followed by removal to mental care unit.  Tests could not identify cause.  Psychosis disappeared on visit from her children.
Gentleman over 70 years, military background. Reported pacemaker problems.  Following investigations, put under observation.
The day following publication of this post, in which I reported the impact of high-intensity
microwaves on birds and insects, I went shopping and on returning to the house, found the front
door open.  We were unsure how this happened.  Next morning, on going into an upstairs room I

discovered what appeared to be a dead bird stuck to a piece of fly-paper suspended from the window.  See photograph opposite.  

When I first moved to my present address, in February 2012, the house was infested with large black flies.  I removed them by opening windows, fly-swats and fly-paper, which is safer than chemical sprays.  When my elderly relative living nearby began to be targeted, she also experienced a swarm of such flies. She happened to know an elderly gentleman who reported a similar experience, and who had the flies identified. Apparently they are a rare species not normally found in the UK.

While drafting this post on Blogspot, perpetrators were altering it as quickly as I wrote it.  Because of this, there may be alterations and omissions.  The WordPress version has also been illegally tampered with, changing formats.  Who would be so dumb as to leave their fingerprints all over the shop, after breaking in?  … That’s right, you’ve guessed it – xxx.

Websites that provide TI advice include the following:





Targeted Individuals: The Myth of ‘Non-Lethal’ Research

Targeted Individuals: The Myth of ‘Non-Lethal’ Research

This post is about:
1.  Why the number of targeted individuals may be increasing.
2.  Why targeted individuals may be used in nonconsensual research.
3.  Why such research can never be regarded as valid.
Targeted Individuals consistently report that they are being used in research experiments. These innocent people are being tortured by criminals, and such torture is a crime against humanity. It is hard to think of a more distasteful subject than cruel nonconsensual experimentation on human beings, motivated by profiteering and greed.
In an earlier post on PerpeTraitor Profiles I mentioned a petition started in 2007, calling for a ban on electronic warfare on civilians.  To date the petition has received over 1500 over signatures, mainly from those describing themselves as TIs. An analysis of those signing the petition by year up to 13 June 2012 is produced in the graph below.
The graph shows a significant increase in those signing in 2011 and a likely similar results for 2012.  Why did the numbers signing increase significantly from 2011?  There could be several reasons including:
–  More TIs finding out about the petition.
–  Increasing internet interest in the plight of targeted individuals – last time I typed in “Targeted Individuals” into a search engine, it produced over 82 million references.
–  A significant increase in the number of TIs.
Some TIs wrote in their survey responses that they had been targeted for over ten or even twenty years.  From this it appears unlikely that TIs are ever released from remote electronic torture.  According to Marshall Thomas, TIs continue to live on, despite what perpetraitors do to them. He states that TI mortality rates are ‘surprisingly low’. In a compilation of evidence for the Presidents Advisory Committee on Human Radiation Experiments March 1995, Marshall Thomas stated:
‘One thing is very clear about the program these people are under…once it starts it never stops until they are dead.  Having said this, it should be noted that the mortality factor for TI’s is surprisingly low considering the ferocity of the torture program that they are under. Though it is difficult to be exact, only about one out of 20 or one out of 40 TI’s appear to die each year.*’
*Extracts from ‘Monarch-the-New-Phoenix-Program-II’, Page 34 onwards.  www.scribd.com/doc/15360318/Monarch-the-New-Phoenix-Program-II
Also, nonconsensual research on TIs is a profitable criminal business, so it is in the interest of the perpetraitors to keep them alive.
Why could there be a sudden increase in the number of TIs?  If the criminals running the TI “business” operate the kind of technology used by large corporations that interact with the public – such as call centres, and back up of records in a data centre – there must be a limit to the capacity of the business to take on new TIs.  So if suddenly more individuals  are being targeted, it could be that perpetraitors recently had a major expansion of capacity. The increase in TI numbers from 2011 would suggest a capacity increase of at least 100%.
What is the implication of a capacity increase for Targeted Individuals?  From what I have seen in my interaction with perpetraitors, they now have a lot of upgraded spare capacity.  It looks as if far more Targeted Individuals than ever before are planned to be targeted.
I suspect that for the perpetraitors, expansion of capacity means larger profits. The more Targeted Individuals they have in their net, the more money they can get. The possible implications of this are that:
–  TIs are becoming a kind of ‘cash crop’ that can be farmed, with increasing reliance on automation and modern facilities.  The primary source of income is through offering TIs as subjects for nonconsensual research.
–  But there are other lucrative markets as well. According to Marshall Thomas, the illicit surveillance of TIs provides for a kind of reality TV which is sold to viewers within the criminal fraternity. See inset below:
‘The TI is both a very  expensive lab rat for the health effects of microwave  weapons, a training tool for a stalking army, a psychology experiment to perfect mind control, fodder for publishing scientific papers, and a commodity to be sold for entertainment purposes a la reality TV.
The incredible expense of gang stalking several thousand people on an enemies list is offset by selling the TI as a human guinea pig for weapons development programs, medical experiments, psychology experiments  (GSA contracts), and a “reality TV show” that might be sold on the internet, satellite TV, or satellite radio.
The audience is made up of several tiers of viewers and participants. The perspective of the drama that unfolds before the satellite TV and internet audience is the action as seen through the eyes of the TI with the targets “inner voice” typed out on the screen below.’  Extract from Page 33 of:
From 28 February to 1 March 2011, the Presidential Commission on Bioethics discussed non-consensual experiments on human beings. During this discussion, Targeted Individuals talked about their experience, and what their life was like because of the experimentation done on them. A few of the Targeted Individuals’ observations on human experimentation are included below:
Observations by Targeted Individuals
1. ‘Gang stalking and harassment was used to implement this nonconsensual biotechnology application that is being used on me… I now experience involuntary limb movements. I receive stingings. I get pains to my head, to my abdomen… I get burning on my lower legs and my ankles. I get ringing in my ears that’s pitch is like they pitch it.’
2. ‘Since 2008 and before, I have endured the following physical and psychological symptoms: extreme debilitating and chronic fatigue, weakness and dizziness for days and weeks at a time… I have an unusual dental filling of unknown origin on the side of one of my back upper right teeth and no memory of having this procedure done… And I have X-ray printouts and a signed affidavit from my dentist stating this.’
3. ‘I wanted to speak about bio-technology applications being utilized on my person. I have medical reports showing eye damage being done to my eyes, my eyes does not have a mirror image, I also have nano wiring inside my eyes, I have pictures of the actual implants from the eye doctor, once enlarging the nano implants, you will see a copy of the actual particles in my eyes. I have CAT scans in my eyes and PETs showing wiring, nano wiring in my head.’
4. ‘I am requesting that the Presidential Commission conduct an investigative hearing on non-consensual human experimentation and I do have credible evidence I’m submitting, 1158 videos and pictures that’s been occurring for the last two years. I’m also presenting 10 attachments which includes my 14-page public comment…’
5.‘For decades I have suffered the following due to these remote weapons and research…To date I have: Non age related cataracts, nodule on thyroid, nodule on adrenal gland and sudden hearing loss syndrome. These are all resulting from being subject to electromagnetic weapons.  Endless MRI’s, X-rays, test after test, specialist after specialist. Thousands of dollars in debt and the doctors cannot find a reason.  I have witnesses.’ www.targetedindividuals.blogspot.co.uk/2011/09/
If one of the main reasons for targeting individuals is to conduct research testing of electromagnetic microwave, laser and psychotronic weapons on various populations, presumably there are groups of people who have commissioned such research, and people who have provided funding – sometimes referred to as donors.
The groups with most interest in the outcome of this research would include the manufacturers and suppliers of these weapons. Is it likely that such groups are going to be concerned about testing weapons on human subjects?  They will, presumably, need evidence of exactly how their weapons affect human populations if they are to sell their products. But they can hardly be seen to commission nonconsensual research. So perpetraitors can profit by exploiting their slave population of targeted individuals as research guinea pigs.
One thing that perpetraitors and electronic weapons salesmen seem to have overlooked – you can’t pull the wool over the eyes of the international community when it comes to proper registration and conduct of weapons research, even if it is not ‘non-lethal’ i.e. not for battlefield use.  There are rigorous standards for all types of research, and evidence of compliance with them will be expected.
Non-consensual human experimentation is outlawed in all humane societies. The targeted individuals who had the courage to give their testimonies to the Presidential Commission on Bioethics had clearly not given their consent to being used as research subjects.  The US Office for Human Research Protections has set out guidance about the basics of obtaining informed consent:- Office for Human Research Protections (OHRP) §46.116 – Informed Consent Checklist – Basic and Additional Elements.  These require that human subjects are clearly informed, amongst other things, about:
– the purpose of the research
– what the research will cover
– how long the research will last
– what tests they will be involved in
– who do contact with questions
– personal confidentiality of records
– what the risks to health are, and
– what will happen if the subject wishes to withdraw before the end of the research project.
Any research testing on humans must comply with fairly stringent standards if the results are to be recognised as valid within the international community.  Human research subjects should not have been experimented on for the same thing before, otherwise their health and mental outlook might have been affected by previous research, and conclusions about current research results could be based on invalid data, and therefore flawed. This would mean that Targeted Individuals must not automatically be transferred from one research project to a subsequent one, although criminals might well do so for financial considerations.
Here are a few of requirements that perpetrators would need to have checked before selecting individuals for targeting:
– Complete health history of research subject and close family and known health risks.
– All medical drugs, vitamins and other remedies taken by the human subject.
– Any substance abuse including alcohol and nicotine.
– Any previous mental health issues.
– Any actions taken subsequently by human subjects to counteract torture and victimisation,
  including shielding against microwaves, diet to counter cancer, maintaining a healthy ph level,
  exercise etc.
– Any medical prostheses such as pacemakers and automatic insulin dispensers, that might be at
  risk of failure because of electronic interventions.
– Previous work in a nuclear power station, which might have exposed a subject to nuclear
– Previous work in an industry involving nuclear radiation products.
– Previous work involving toxic chemicals.
– Previous work in a cell phone factory.
– Previous involvement as a human research subject in similar research projects.
In commercial research for medical drugs, the clinical records and the full testing records for each human subject must be available for scrutiny by the relevant independent standards checking authorities.  The perpetraitors would have to maintain similar research records and make them available to independent scrutiny, if their ‘research projects’ were to be recognised by the international community.
We have heard what some targeted Individuals reported to the Presidential Commission on Bioethics about their experiences.  Does this sound like research to you?  Is it likely that a bunch of criminals went about drawing on TIs’ official health records and establishing their suitability before selecting them for targeting?  And are the so-called ‘research case papers’ going to be examined by an independent research body to ensure records can be relied on?  If not, then whatever research results the criminal perpetraitors eventually come up with must be open to question, making the whole research project unviable.
Anyone having doubts about this? Read the provisions of the Belmont Report – ‘Ethical Principles and Guidelines for the Protection of Human Subjects of Research’, summarised at the end of this post.
If you look at what Targeted Individuals have to say about their experiences, the only conclusion that can be drawn is that whatever is happening to them cannot be classified as research. It is also clearly nonconsensual, and therefore against the law.
Based on what appears to be the significant increase in the numbers of Targeted Individuals, major investment is being made in this criminal activity, perhaps for decades to come.  If that is being done in the mistaken view that results from targeting individuals can be used to prove that some kind of research has been conducted, then billions of dollars have already been wasted for no justifiable reason, and thousands of innocent human beings have been subject to appalling misery and torture.
In 1979, the Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research, was published in the United States to provide a succinct description of the mandate for review of research involving human research participants.  Regulation and guidelines concerning the use of human research participants in the U.S., and increasingly so in other countries, are based on the following fundamental elements excerpted from the Belmont Report:
Respect for Persons – In research, respect for persons demands that participants enter into a research program voluntarily and with good information about the research goals.
Beneficence – to do no harm and to “maximize possible benefits and minimize possible harms” to the individual research participant.  Investigators – or in this case perpetraitors – and their institutions have to plan to maximize benefits and minimize risks.
Informed consent – the informed consent process must allow human participants, as much as they are able, to be given opportunity to choose what will or will not happen to them.  The consent process must include information to the participant about the research; the participant must understand the information and volunteer rather then be coerced into participation.
Assessment of Risks and Benefits – Assessing risks and benefits means the researcher needs to assemble all data that explains why the research will obtain the benefits that are sought by the research project. The review committee of the researcher’s sponsoring institution, upon review of the collected data, can decide whether the risks to the subjects are justified.  Prospective participant can determine whether or not to participate.
Selection of Participants – The principle of justice—that benefits and risks of research be distributed fairly.  Researchers are not just if they only select disadvantages persons for risky research or only provide beneficial research to groups they favor.  Special classes of injustice arise when participants are drawn from vulnerable populations, like those institutionalized or incarcerated in prisons, racial minorities, economically disadvantaged or the very sick. www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
Sources of images for this post:
Slavery Frieze – Detail from ‘Slavery’ frieze www.bbc.co.uk/london/content/articles/2007/03/16/passage_of_time_feature.shtml
While drafting this post, unauthorised alterations were made to it, prior to publication.  There are those who do not want information to be made available publicly even though it is already in the public domain. They know that they have committed crimes against humanity, and they fear that the consequences of their actions will confront them.


Targeted Individuals: Seeing Through The Perpetraitors

This post is about information in the public domain, recently highlighted in the UK and   US media, about miniature lenses that can sit on an eyeball and communicate with other devices used for military purposes.  Based on reports of targeted individuals, similar  technology may already be in use to enable perpetrators to see through our eyes.

In my post on ‘Perpetraitor Profiles’ I mentioned that several Targeted Individuals recorded that perpetraitors were looking through one or both of their eyes, and that a technology called Remote Neural Monitoring could be used to do that.  But it wasn’t clear how that worked in practice.  

Since then I have done some more research and, based on the information and evidence quoted below, I have come up with a theory about how perpetrators could look through the eyes of Targeted Individuals.  So here is my argument for what technology is being used, and how it works.


In 1999 scientists proved that they could look through the eyes of a cat. BBC News Online Science Editor Dr David Whitehouse reported: ‘ A team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing… To their amazement they say they saw natural scenes with recognisable objects such as people’s faces. They had literally seen the world through cat’s eyes.’



In March 2008 Fox News reported that ‘U.S. military engineers are trying to design flying robots disguised as insects that could one day spy on enemies and conduct dangerous missions without risking lives… In essence, the research seeks to miniaturize the Unmanned Aerial Vehicle drones used in Iraq and Afghanistan for surveillance and reconnaissance.’ www.foxnews.com/story/0,2933,456384,00.

In November 2008 Fox News also reported that ‘The next generation of drones, called Micro Aerial Vehicles, or MAVs, could be as tiny as bumblebees and capable of flying undetected into buildings, where they could photograph, record, and even attack insurgents and terrorists.’www.foxnews.com/story/0,2933,456384,00.html#ixzz22s2VQHy3

 In July 2009 the journalist Chares Q. Choi reported that: ‘Scientists can already control the flight of real moths using implanted devices.  The military and spy world no doubt would love tiny, live camera-wielding versions of Predator drones that could fly undetected into places where no human could ever go to snoop on the enemy.’www.dailymail.co.uk/sciencetech/article-527328/Insects-fly-wall-spies-tiny-cameras-radio-controls-microphones.html#ixzz22s0vDPMK



On 3 February 2012 the UK newspaper the Daily Mail reported:

‘DARPA – the Defense Advanced Research Projects Agency, thought of as the American military’s ‘mad scientist’ wing – has been funding research on ‘soldier mounted displays’ for some time, but previous versions have been bulky.

The lenses, made with nano-scale engineering processes,work as a hi-tech focusing device, which allows Innovega’s glasses to be considerably less bulky than previous devices.   The lenses themselves require no power, and thus can sit safely on the eyeball.’*  *My emphasis 

DARPA Says, ‘Innovega’s  iOptiks are contact lenses that enhance normal vision by allowing a wearer to view virtual and augmented reality images without the need for bulky apparatus. ‘

‘Instead of oversized virtual reality helmets, digital images are projected onto tiny full-color displays that are very near the eye.’

These novel contact lenses allow users to focus simultaneously on objects that are close up and far away. www.dailymail.co.uk/sciencetech/article-2095987/Virtual-reality-contact-lenses-beam-images-directly-eyes-sale-2014

On 14 April 2012, the Daily Mail ran an article under the headlines:


  • Lenses can let troops see through ‘eyes’ of drones flying above.
  • Can ‘layer’ target information over view of world.
  • Contact lenses don’t impede fighter’s vision.
  • Equivalent to a 240-inch 3D television from 10 feet’.

The Daily Mail reporter, Rob Waugh, stated that:

‘The Pentagon has placed an order with Innovega for lenses which focus 3D battlefield information from drones and satellites directly into people’s eyeballs*. The tiny ‘screens’ sit directly on users’ eyeballs and work with a pair of lightweight glasses with a built-in translucent screen. *My emphasis 


On Sunday 29 July 2012, the Daily Mail also reported that:

‘The system is designed to improve the awareness of a military team as a whole, allowing soldiers to see through the eyes of their team mates in real-time’.* *My emphasis 



According to John St Clair Akwei, a former surveillance specialist, Remote Neural Monitoring plays a key role in the targeting of individuals:

‘Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.’ 

From an article in Nexus Magazine April/May 96 from MindControlForums Websitehttp://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm

John St Clair Akwei does not say how Remote Neural Monitoring is achieved.  Dr John Hall, medical anesthesiologist, author of ‘A New Breed: Satellite Terrorism in America’ and a targeted individual, states that satellite technology was used at an early stage to connect electronically with computers. Drawing on his experience in the medical profession he notes that Electroencephalograms – EEGs – are routinely used in hospitals to monitor brain wave frequency activity, and that when connected with satellite technology, a similar type of equipment will enable a perpetraitor to hear what you hear and see what you are seeing in real-time.


For Remote Neural Monitoring to work, satellite technology must have some way to connect with the targeted individual. Perpetraitors can see Targeted Individuals all the time using lasers and satellite technology. But they can also look through the eyes of a Targeted Individual. So far I have not been able to find anything that describes how this is achieved, but I think that nano-scale cameras must play a part in enabling perpetraitors to see through the eyes of targeted individuals.

The reason I think this is that:

  • The Daily Mail reported how US military battlefield methods are being upgraded with drones or satellites connected to cameras that can ‘safely sit on the eyeball’ of soldiers, allowing them to ‘see through the eyes of their team mates’.
  • If  the US military weapons described in the Daily Mail articles could connect with drones and satellites without using nano-scale eye cameras they would have done so, as it can hardly be convenient  for soldiers to be fitted with a type of contact lense attached to a camera, however small.  If the US Military didn’t need nano-scale cameras I doubt if the US army would be doing what they are doing.
  • The US military weapons system has some similarities with the Remote Neural Monitoring, and it is quite possible that RMN would need nano-scale cameras in the same way.
  • TIs report that perpetraitors only look through one of their eyes.  This is consistent with having a camera installed in one eye.

My theory is that perpetraitors can see through both our eyes, using satellite technology to track into our brains and connect with a nano-scale camera attached to or implanted on the outside of the eye.


My impression was that perpetraitors could look through one of my eyes, although I now think they can see through both eyes, even if our eyes are closed.  Something else I noticed was that in the dark I could see the nano-scale camera implant equipment shining white inside both my eyes, although it appears that only one eye has a camera.

And in daylight I saw something in one of my eyes that looked like a black comma.  At first I thought it was a floater. Then I saw a clothing advert on a bill board, and noticed that the model had a comma drawn above her cheekbone. It looked like the one in my eye.   I searched the words ‘comma symbol’  on the Internet and found that there is a computer game called Naruto which has a huge following, and that the comma symbol is known as a Sharingan.

I also found out that you can buy contact lenses that give you a whole range of Sharingans. Could it be that some perpetraitor technician is into Naruto games and is making nano-scale eye camera implants that have a Sharingan on them?

Picture opposite: Sharingans. http://en.wikipedia.org/wiki/File:Sharingan.jpg


After reading the articles referred to above in the Daily Mail, and adding to them the information I had from my own experience, I began to realise that a TI with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

But the set up could work just as well if the Targeted Individual was the third party with weapons capability, if the camera in the TI’s eye could be used as a weapon to be fired at someone or somthing. Could some Targeted Individuals be used as human handgrenades? And could the system work just as well if the Targeted Individual had a separate camera in each eye? Or could the second camera be embedded centrally somewhere else in the TIs head?

I put a patch over my eye – the one with the Sharingan in it. I could see as well with the other eye as if I had two eyes. But for the first time, I noticed a blurred patch in the middle of the other eye. Could that blurred patch be an invisible camera sight? I had already seen the placement socket shining in the dark as if reflecting ultraviolet light. Did it make any difference whether my eyes were open or closed?

At this stage, I hope I am wrong in my conclusions. Last week, I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass. The mark in the glass was where my eyes were focused when the windscreen got hit.


Are nearby people and living things at risk when individuals are targeted electronically?

When perpetraitors target me with microwaves, birds and squirrels do not visit the food table outside. When perpetraitors stop targeting me with microwaves, birds crowd the table, as if making up for lost time.

This made me wonder how wide a space is covered when perpetraitors target individuals.  Could it affect people nearby, for example sleeping in the next room.  Could it affect neighbours sleeping in a semi-detached house.  And what effect could it have on partners of targeted individuals.


Anti-histamine cream and tablets appear to be helpful, based on my experience.  Maintaining an alkaline ph balance may also assist – for example, drinking lemon juice or cider vinegar.  Perpetraitors  get agitated by this, so it may nullify the results of some laser or microwave research testing.  Microwaves leach calcium out of bones, with results similar to osteoporosis. Taking a sufficiently strong dose of calcium citrate with vitamin D3 on a regular basis can counter the effects of this. 1000 mg of calcium with D3 a day would be the lowest suggested level.  Seeking the advice of a pharmacist is advisable.

After using aluminium protective eye shades at night for a while I could see that I had a ‘sunglass mark’.  My face was more red – except where the eye shades covered my face. One side of my face was less red than the other, probably because I sleep  on that side. I am not sure if this was caused by directed laser or microwave energy.  Sleeping in sunglasses or eye shades covered with aluminium foil may be beneficial. Attaching a cloth container such as a sunglass case to eye shades, and filling it with aluminium is another option.

NOTE: This post may not read as I would wish, owing to multiple interventions made on my Blogspot post by perpetraitors while I was trying to draft it. In recent weeks I have been subject to an onslaught of interventions and attacks by perpetrators while drafting, and I sometimes find that publishing the post as work in progress is best. Criminal encroachment in the internet operations of another country is a breach of international law.

Targeted Individual: Perpetraitor Event Record


The table below is a record of perpetraitor interaction with the targeted individual – author of this blog.  It was started in view of the increasing difficulties facing the targeted individual in writing and publishing posts. At the time of writing, one laptop has been broken, and Broadband filters have had to be replaced.

I do not live in the United States.

This post was first published on 31 July 2012.



  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised intervention in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • While cleaning teeth, ‘frequency cleaning’ toothbrush got targeted and started to sound like an electric toothbrush for about 12 hours.


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Multiple unauthorised interventions in my Apple MacBook Pro operations
  • Targeting of lower intestinal cavity on low power


  • Psychotronics standard interface
  • Non-standard unauthorised targeting of lower intestinal cavity on full power 
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised intervention in my Apple MacBook Pro operations


  • My iPhoto application containing about 5,000 original photographs wiped twice, but I had a back-up
  • Psychotronics standard interface
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Multiple unauthorised interventions in my Apple MacBook Pro operations.


  • Psychotronics standard interface
  • Standard exposure to frequency devices
  • Targeting of lower intestinal cavity on low power
  • Targeting of respiratory system
  • Unauthorised interventions in my Apple MacBook Pro operations, including alteration of this record, both off-line before it was published, and systematically freezing some WordPress functions on-line while it  was being published.
  • Alteration of the colour settings on the photographs in my iPhoto library.


  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro operations including attempted block on access to Blogspot and WordPress, which were reported to Apple Computers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro operations affecting the colour settings of my photographs in iPhoto.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on  internet access for two hours necessitating assistance from internet service provider.
  • Unauthorised intervention in Blogspot while drafting my blog.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto and other applications.
  • Block on internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices, including, during shift 24.00 – 08.00 BST 4-5/7/12/, microwave heating 15 minutes – the relevant US research time allowance.
  • Block on  internet access to Blogspot, reported to Apple Computers.
  • Unauthorised intervention in Blogspot while drafting my blog.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard exposure to frequency and other devices including targeting of heart and attempts at ‘waterboard’ asphyxiation  experience, by contracting throat area and expanding internal nasal tissue to reduce breathing space.
  • My perception was that the targeting perpetraitor had been taking alcohol or a mood-changing substance.
  • During shift 24.00 – 08.00 BST 5-6/7/12, non standard targeting by exposure to waves, starting at 04.05 BST.  Time did not exceed the fifteen minutes research allowance as targeting unit lost power, because the headset was vacated and left on. Both perptraitors were absent from the unit during that time.  The vacated headset appeared to trigger the attention of others, who logged on to a virtual environment, not physically located at the same installation, to establish why the headset was left on.
  • Sleep deprivation.


  • Sleep deprivation.
  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised intervention in Blogspot while drafting my blog, reported to Apple Computers.
  • Sense of smell targeted.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Block on internet access to mail, reported to Apple Computers.
  • Sense of smell targeted.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Digestive system ph targeted.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.
  • Digestive system ph targeted.
  • Sleep deprivation.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.


  •  Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Blocking internet access to Blogspot and WordPress, reported to Apple Computers.
  • Sleep deprivation.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions on WordPress blog.
  • Sense of smell targeted, producing toxic chemicals affecting breathing.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.


  • Psychotronics standard interface.
  • Exposed to infrared frequency for over 40 minutes.
  • RMN stimultion of cerebral cortex to induce symptoms of dehydration, toxification and breathing difficulties.
  • Interference with eye focus, laser targeting of eye
  • Sleep deprivation
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.


  • Psychotronics standard interface.
  • Unauthorised interventions in my Apple MacBook Pro affecting functions in iPhoto.
  • Blocking internet access to Blogspot, reported to Apple Computers.
  • Sleep deprivation.


  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.


  • Psychotronics standard interface.
  • Unauthorised intervention blocking internet access.
  • RMN stimulation of cerebral cortex to induce symptoms of breathing difficulties.
  • Short-term memory manipulation.


  • Psychotronics intermittent signal.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.
  • Short-term memory manipulation.


  • Psychotronics intermittent signal.
  • Force field created in attempt to break perceived jamming of signal. Side effects.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequency applied to living space.


  • Psychotronics intermittent signal. Tests to establish cause and extent of signal disfunction including visual imaging, audio reception, subject intervention, subject response.


  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Unauthorised blocking of several Apple computer applications.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level and linked to fast acting cancers.


  • Psychotronics intermittent signal.
  • Reduced exposure to frequency devices.
  • Interference with natural eye focus function.
  • Unauthorised blocking of access to WordPress blog, reported to Apple computers.


  • Psychotronics intermittent signal
  • RNM used to produce breathing difficulties for over 30 minutes from 21.34-22.10 BST.
  • RNM used to produce synthetic heart beat anomalies
  • RNM used to produce synthetic acid within thyroid and digestive tract, to alter ph level, linked to fast acting cancers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • RNM used to produce synthetic heart beat anomalies
  • Unauthorised blocking of several Apple computer applications.
  • Malicious damage to files in iPhoto library.
  • Breathing difficulties from synthetic noxious chemical frequencies.
  • RNM used to produce synthetic acid within digestive tract, to alter ph level, linked to fast acting cancers.


  • Psychotronics reduced interface.
  • Reduced exposure to frequency devices.

Targeted individual was out of doors or travelling for over 12 hours.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers.
  • Malicious damage to files in iPhoto library.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Malicious alteration of family photographs in Apple computer IPhoto Library.
  • Creation of illict shared areas on Apple computer Finder in names of Bert, bthub3 and kat-pc.  Reported to Apple computers.
  • Attempt to wipe short-term memory to prevent reporting.
  • RNM targeting of lymph glands and thorax, linked to  fast acting cancers.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Unauthorised blocking of access to Blogspot and WordPress, reported to Apple computers and Google.  Access enabled.
  • Targeting eyes.  Note: This used to be included in ‘Standard Exposure’, but in future will be specified.
  • Several events of exposure to heat either by microwaves or infrared radiation.


  • Psychotronics standard interface.
  • Standard exposure to frequency devices.
  • Targeting eyes.
  • Several events of exposure to heat either by microwaves or infrared radiation.
  • Incapacitating breathing difficulties from synthetic noxious chemical frequencies.
  • Unauthorised removal of copies of documents on my Apple computer, including this one.
  • Re-creating password-protected shared area ‘bthub3’ on my Apple computer.


  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Unauthorised changes to photographs of people.
  • Intermittent attempts to block internet access throughout a 6-hour period from 06.10 a.m.- 12.10 p.m BST.


  • Recreation of illicit shared area on Apple computer Finder in name of bthub3.
  • Exposure to heat either by microwaves or infrared radiation for over one hour.
  • Exposure to other microwave technology with greater tissue-depth of impact.
  • Targeting eyes.
  • Re-creating unauthorised password-protected shared area ‘bthub3’ on my Apple computer.


  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Exposure to microwave technology with greater tissue-depth of impact.
  • Breathing difficulties.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface.
  • Exposure to heat either by microwaves or infrared radiation.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface
  • Reduced exposure to standard frequency devices.


  • Psychotronics standard interface.
  • Reduced exposure to standard frequency devices.
  • Subject of training for perpetraitors on synthetic telepathy – possibly exam conditions.
  • Illicit manipulation of computer data.


  • Psychotronics standard interface.
  • Exposure to electromagnetic force field.
  • Focused microwave targeting of head.
  • ELF targeting of intestine using non-standard equipment at 18.20 BST.
  • Exposure of face to heat either by microwaves or infrared radiation.
  • Microwave targeting of body.
  • Illicit manipulation of computer data and reconstruction of illicit shared area.


  • Psychotronics standard interface.
  • Standard Exposure to frequency devices.
  • ELF targeting of intestine using non-standard equipment at 03.30 a.m. BST – halted by Targeted Individual activity.
  • Interference with Apple computer operations and Pages computer files.


While updating this blog on 11 August 2012, I observed that unauthorised alterations were made after I saved the update, requiring further amendment.  I check the accuracy of this record, but cannot guarantee that what is recorded at a specific point in time is what I intended the record to state.  My gratitude goes to WordPress, for maintaining the best security they can under difficult circumstances.

Targeted Individuals: Why People Get Targeted


An independent researcher Marshall Thomas developed an assessment of why some people got targeted and not others.   In his book ‘Monarch-the New Phoenix-Program’* he states that:

‘After meeting with 220 individuals and subjecting their case studies to an epidemiological analysis it was possible to assign the group with a collective set of risk factors. It is helpful if the reader will imagine a huge database with millions and millions of names… perhaps everyone in the United States. The targets are chosen with a computer program that gives a cumulative weighted score to each name when they engage in a certain proscribed activity. Picture this computer program acting as an elaborate three strikes and you’re out program. Every targeted activity or behavior carries a weighted score and every entry to the TI’s name increases their cumulative score. When the score reaches a certain quantity then that person is automatically enrolled in the program as a target’.



Marshall Thomas shows how the scoring works. Taking the case of a lady in her seventies who was targeted, he examines the reasons:

  • Strike One: Civil rights activity.
  • Strike Two: An FBI file.
  • Strike Three: Working for a major oil company as well as any personal or family association with the intelligence community.
  • Strike Four: Foreign travel to certain countries as well as learning a foreign language and integrating with a foreign culture.
  • Strike Five: Being permanently injured and on disability – a “drain on the system”*.

*Extracts from ‘Monarch-the-New-Phoenix-Program-II’, Part VIII, Page 34 onwards. 

Marshall Thomas notes an additional criteria – whistleblowers, which he considers ‘may comprise as many as 5-10% of all cases of targeted individuals’.

He states that ‘There is a great deal of variability across the range of TI’s in both the reasons for their targeting as well as in the manner that they are targeted. Academics, scientists and inventors who possess intellectual property of value are often targeted to relieve them of their ability to retain their patentable intellectual property. Microbiologists are particularly well represented in the target population.

Multiple targets share the risk factor of belonging to religions such as Jehovah’s Witnesses, Mormons, Buddhists, Christian sects, and other groups that are not mainstream religions, a category that will be referred to as religious dissidents. Twins are very common targets, usually one twin is overtly targeted with electronic harassment and microwave weapons while the other twin functions as the control group’.


The author and whistleblower Robert Duncan, in his free e-book ‘The Matrix Deciphered’*- puts human experimentation as the main reason why individuals are targeted. He says that:

‘Two high level FBI agents and a couple CIA agents have come forward to validate the existence of a MKULTRA like project that continues to grab random people for mind control experimentation.’

‘Two of these have since become part of the program and endure daily psychotronic tortures. All the torture can be done using directed energy psychotronic weapons with the so called continental ballistic missile surveillance defense grids’.

Robert Duncan says his reason for writing the book was ‘to help consolidate the technical information about the most advanced, secret military weapons being tested on civilians throughout the world, and to give new test victims a literary reference that they can give to police officers, psychiatrists, and family members so that they can be quickly educated on what is happening them’.

Robert Duncan, himself a TI, is a professor in computer science and business. He states that he has  ‘interviewed over two hundred people and worked on the highest level of military projects for the U.S., NATO, and U.K. and have given videotaped testimony to senators and representatives’

* www.freedomfchs.com/thematrixdeciph.pdf


Several researchers have commented on the significantly higher numbers of women in the population targeted individuals.  One of the reasons for this could be compliance with the US Public Law 103-43 which requires that:

1.  ‘Women and minorities be included in all clinical research studies, as appropriate for the scientific goals of the work proposed.

2.  Additionally, NIH policy requires that women and members of minority groups and their subpopulations be included in Phase III clinical trials in numbers adequate to allow for valid analyses of sex/gender, racial, and/or ethnic differences in intervention effects.

3.  NIH policy also states that children (defined as persons under the age of 21) be included in human subjects research supported by NIH unless an acceptable justification for their exclusion is provided.

4.  The NIH Peer Review regulations (42 C.F.R. 52h) specify that reviewers will take into account, in determining overall impact that the project in the application could have on the research field involved, the adequacy of plans to include both genders, minorities, children and special populations as appropriate for the scientific goals of the research.

5.  Therefore, reviewers must evaluate the proposed plans for inclusion of women, minorities, and children as one of the review criteria that factor into the evaluation of scientific and technical merit’.

This underlines the point that targeting is about nonconsensual human experimentation, and the need to get a suitable research population.

Source: ‘Human Subjects Protection and Inclusion of Women, Minorities, and Children, Guidelines for Review of NIH Grant Applications’, www.grants.nih.gov/grants/peer/guidelines_general/Human_Subjects_Protection_and_Inclusion.pdf


Marshall Thomas sees the three main reasons for targeting of individuals as merging into an overall strategy:

–  perfecting (EMW) electromagnetic weapons on unwilling people – human guinea pig experiments.

–  neutralizing potential enemies on a hit list, political activists and whistleblowers, by using them as the unwilling subjects of the human experimentation.

–  using extreme trauma, sleep deprivation, and other torture techniques delivered by EMW to the targets to further refine the science of behavior modification.



In his book The Hidden Evil’, author and researcher, Mark M Rich states:

‘Although whistleblowers, activists and others have been targeted, the scope of this worldwide program is too big for it to be limited to a parallel justice system… According to both McKinney* and Moret*, it has moved beyond experimentation and is being widely used on the civilian population’…  ‘Dr Kilde* adds, “Today ANYONE CAN BECOME A TARGET, even those who invented the system”.  www.freedomfchs.com/thehiddenevil.pdf

Mark M Rich is another targeted individual. His website is www.gangstalking.wordpress.com/category/mark-m-rich/

*Sources quoted by Mark M Rich:

The Investigative Journal, Julianne McKinney; 



Co-op Radio, Leuren Moret; 


Microwave Mind Control, Dr Kilde;


PerpeTraitor profiles – the low down

Targeted Individuals (TIs) have been, and continue to be, the victims of unspeakable atrocities, and some have lost their lives.   The technologies involved have been available for a long time now.  For example, as early as 1969 Dr Jose Delgado, a Yale psychologist, was showing how electrical stimulation of different parts of the brain resulted in changes in breathing rhythms and heartbeat rhythms:-  www.unwittingvictim.com/Delgado.

To judge by the number of TIs reporting what has happened to them, there must be many criminal perpetraitors.  The number of TIs can only be estimated, but some indication may be drawn from a petition started in 2007, calling for a ban on electronic warfare on civilians  –  www.ipetitions.com/petition/synergy/signatures.

To date the petition has received over 1500 signatures, mainly from those describing themselves as TIs.  While numbers of signatures can only be indicative, there have clearly been ongoing issues since 2007.  Even one TI is one too many, but the petition numbers are probably only the tip of the iceberg.  The significant increase in 2011 and emerging figures for 2012 raise serious questions. Greater publicity for the petition might be one explanation, but I only discovered the website by chance this month, and I never saw any publicity for it. The testimonies of some of the signatories are heart-rending.

Signatures supporting a ban on electronic warfare on citizens from          2007-2012.  Source: www.ipetitions.com/petition/synergy/signatures
What kind of person would routinely torture targeted individuals on a daily basis using electronic harassment and synthetic telepathy?  From the time that I became a targeted individual, I was obliged to interact with some of these people.  They used synthetic telepathy to talk to me – for an explanation of this see www.en.wikipedia.org/wiki/Thought_identification, and they sounded like any normal human beings you might meet in any street or office, except that they were abusive, cruel and manipulative. People said the same thing about staff working in Nazi death camps.  They went home at the end of the day to be with their families, and neighbours had no indication of what they were involved in.
This blog looks primarily at aspects of perpetraitor psychology and technology.  But while going down that route, we must not forget that the perpetraitors’ role is to operate a range of targeting devices that deliver torture to the body of the victim, and can cause cancer, heart ailments and malfunction of physical organs.
Who are the PerpeTraitors?
For some months I was obliged to live as if in close quarters with perpetraitors 24/7.  During that time I observed their behaviour, and it seemed to me that they fell into four categories:

–  Experienced criminal operators

–  “Old lags” – disgraced law enforcement / security officers, who may have     criminal convictions

–  Younger criminals with state-of-the-art ITC skills

–  “Les Miserables” – young kids, mainly women, who may have been targeted, or exploited or who got into something they didn’t understand.

Perpetraitors can listen to your thoughts, and their equipment allows you to hear their voices – but not their thoughts. The range of technologies that may be used are described at:  www.surveillanceissues.com/surveill.

One of the things they don’t tell you is that synthetic telepathy can become more of a two-way process.  Based on my experience, if they can hear your thoughts, over time you can begin to build up a picture of what is going on at the other end of the ‘phone’, both aurally and visually, using the same equipment that they use to spy on TIs.  During the initial phases of targeting, the picture I began to build up was of a large room, one wall of which was like a plasma screen.  Information about each TI was displayed in series on the screen.  There were technicians, using automated software to manage the daily caseload of criminal interventions used to target each individual. It felt like a secure data centre IT environment, with staff quietly going about their daily tasks. Perpetraitors were anonymous, hardly interacting with me, though sometimes I heard them talking to each other.  What were these people like, I wondered. I pictured several casually-dressed men in their middle to late thirties, sitting round a table, playing cards, while helping themselves to soft drinks and snacks.

Later on it seemed I was targeted by a smaller criminal outfit operating a mix of experienced and less experienced perpetraitors, usually working three shifts a day in pairs.  If the TI sleeps at night, one perpetraitor may operate alone, using programmed interventions in an attempt to manipulate TI dream states.

A number of TIs have described on the internet how they were harassed through ‘street theatre’ using standard scenarios.  In my case, the theatre was more economically produced using holographic visual software designed to work with brain communications technology, drawing on stock scenarios. The daily dramas required perpetraitors to interact directly with the TI and ad lib in line with TI responses, rather than follow electronic screen prompts. The different characters in the dramas were created using  equipment that can transmute voices into different personalities, a bit like a synthesiser, switching genders and age to suit whatever story they were telling. Perpetraitors displayed enthusiasm in preparing their daily shows.  No doubt there is a lot of boredom in their work.  I got the impression that some of them were wanabee Hollywood script writers and movie directors.  It is sad that people could fall so low, when human potential offers so much more.

Use of Satellite Technology

According to some researchers such as Dr John Hall –  http://www.satweapons.com, satellite technology is an essential part of effective targeting of individuals. Even if TIs are a long way off – in a different country, for example, they can be located and tracked for targeting.  According to the website www.surveillanceissues.com/results, ‘advanced satellite surveillance systems can be accessed by corrupt “businessmen”, including media and political figures. They can access audio-visual material as well as intercept telecommunications. The results can be used to rob, blackmail, harass or humiliate targets. Targets include competitors, researchers, writers, inventors, lobbyists, law enforcers etc’.

Another website reports that ‘Private criminals or corrupt government are tapping into and somehow gaining access to Government satellite technology using Remote Neural Monitoring and terrorizing individuals. It is claimed that this is being done illegally to individuals across the United States. www.satelliteterrorism3.blogspot.co.uk/

Commercial satellite technology is readily accessible around the world to those who can afford to pay for it.  ‘As to where demand is coming from, the United States is the dominant force in this sector, with a 30 percent share due to high-demand from NASA and the Department of Defence (DoD). Europe enjoys a 25 percent share, while Asia follows suit with 22 percent thanks to activity in China and Japan. Russia has a 13 percent share of the market, while the Middle East and Africa (MENA) tops 9 percent and the rest of the world follows with 5 percent’. http://www.satellitetoday.com/via/features/The-Bright-Future-of-Small-Satellite-Technology_37150

It occurred to me that criminals intent on satellite targeting of individuals might buy access to some of the many satellites offering commercial opportunities, if there was a high enough profit from what they were doing.   Some examples of the way that perpetraitors might profit targeting of individuals are listed in the section on ‘Money, malice and revenge as criminal motivating factors’ below.

Perpetraitor operations

Perpetraitors do not necessarily have that much real-time interaction with TIs, although the TI is meant to think that they are on the other end of the line all the time.  Often what is actually being transmitted is an interactive programme using Neurophone technology, which provides a running commentary on the TI’s thoughts and feelings.

‘The computer repeats (echoes) your  own thoughts and then the human monitors comment or respond verbally’ …’Whilst the live/human comments are individualistic and unrelated to the victim’s own thought processes, oftentimes the artificial intelligence involved will parrot standard phrases.  These are triggered by your thoughts while the human monitors remain silent or absent’. www.surveillanceissues.com/default.

The programme can call on automated prompts which provide negative feedback, based on the TI’s thought response. These comments may be accompanied by synthetic noises like mocking canned laughter, jeering, hissing, and conspiratorial whispering. The perpetraitors can switch to manual for real-time interventions.

It is possible for a TI to halt the operation of the running commentary in a number of ways. The programme relies on TI feedback to continue running, and if there is no TI feedback for about an hour the programme will switch off. Eliminating thought for an hour is hard to do, but there is a much easier way to throw a spanner in the works. The programme is interactive and responds to what the TI is thinking.  If you ask the system a question for which it does not have a programmed response, the system will stall.  What questions will stall the programme?  Well at the time of writing some of these might work:

  • Who are you?
  • What is your experience of…?
  • When was the last time you…?

If a targeted individual happens to have nothing better to do than provide open questions to the programme, the system will pack up eventually, owing to lack of TI thought input.

Perpetraitors like to make out that they are all-powerful and impervious to any risks.  Listening to them, I realised that they don’t necessarily know that much about the technology they use, or the potential risks to themselvesas well as to TIs whenever they tortured their victims.

Junior perpetraitors may be at risk of targeting by their criminal overseers, one of whom thought nothing of using torture weapons on one of his young female staff on one occasion.

Criminal bosses may have told perpetraitors that electronic equipment they use is perfectly safe.  But you cannot always rely on what people say about technology.  For example, some people said that TSA scanners posed no threat to the health of air passengers or equipment operators.  The EU took a different line and banned their use: www.Newsfeed.time.com/2011/11/17/Europe-bans-airport-x-ray-scanners-that-u-s-still and www.metro.co.uk.

Since then there have been reports in the US that some TSA operators are being diagnosed with fast acting cancers:

Perhaps perpetraitors are also at risk from the technology they use.

Some TIs are used as guinea pigs   

Some TIs report that they were experimented on for research purposes.  I had the impression that this happened to me too.  I am fairly sure that perpetraitors also used me as a subject during training of criminal recruits.

Altered states of consciousness leading to paranoia and psychosis appear to be the main means of gaining control over TIs, so research might be expected in this area.

Perpetraitors were trying out different approaches, focusing on psychotronics to deliver altered states of consciousness.  It felt as if they were trying to make me inhale something like chloroform or carbon monoxide. Other criminals sometimes joined the perpetraitors in what seemed like a virtual chat room, to study the effects of new approaches on me.

According to Dr Carole Smith, PhD, in ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’* asphyxia can be induced by altering frequencies in the brain that control breathing.  Perhaps other altered states of consciousness can be produced in a similar way.  I have found that going out into fresh air greatly reduces the impact of synthetically induced breathing problems.

On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’, Journal of Psycho-Social Studies, 2003.  www.globalresearch.ca/index.php?context=va&aid=7123

Money, malice and revenge as criminal motivating factors

Perpetraitors try to conceal the reason why TIs are targeted.  It was a while before I realised that at certain times, those torturing me were worried about meeting some delivery deadlines linked to incentive payments.  Perpetraitors were strongly focused on:

  • meeting  set levels of activity using various types of equipment
  • delivering a different drama every day
  • demonstrating that I was deprived of sleep for a specific number of days
  • ensuring a steady flow of interactions with the TI throughout their particular shift.

If the end of the shift was approaching, and targets had not been met, perpetraitors became tense and morose.

Why are the criminals doing it?  The short answer is that they do it to earn a living.  The objectives may vary, but I have read of reported cases where a “client” requested the criminals to deliver specific outcomes in exchange for payment.  Dr John Hall explores this in his book ‘A new breed: satellite terrorism in America’, 2009. Outcomes might include:

  • Changing a will in favour of a client
  • Beak up of a marriage
  • Constructive dismissal of a TI
  • Getting a TI to sell property  to a client at an advantage price
  • Forcing a TI to leave a particular neighborhood.

Other cases recorded on the internet suggest that criminal perpetraitors or their clients, motivated by jealousy or revenge, tried to have targeted individuals assassinated remotely, for example by a fatal stroke or heart attack, or arranged to have a member of a TI’s family hurt in some way.

I know of one particularly distressing case in which a couple visiting North America were targeted during their stay, and one of them was hospitalised with a life-threatening illness.  At the same time, it transpired that the elderly mother of one of them, living in their home country, was suddenly diagnosed with paranoia and psychosis, and sectioned.  Clinicians carried out extensive checks, as she had recently had a routine operation, but could find no cause of the change in her mental health. The attack on the helpless elderly mother was a cowardly despicable act of criminal exploitation motivated by malice.

How would perpetraitors feel if their own mothers were being treated this way?Perhaps perpetraitors are not capable of experiencing human feelings.

Revenge played a part in my becoming a targeted individual. Listening to perpetraitors talking among themselves I identified one of them – falling into the ‘old lag’ category, as having a grudge against my employer. I later learned the initial justification was the amount of overseas travel I did.


In his book ‘A new breed: satellite terrorism in America’, Dr John Hall states that perpetraitors use satellite surveillance equipment hacked into by criminals, to see what TIs are doing in their homes.  Some TIs report that perpetraitors are with them wherever they go, and comment on what they are looking at – www.emhdf.com/akwei. This has been my own experience.

A number of other TIs report having similar experiences:

What technology would enable perpetraitors to look through my eyes?  It occurred to me that it might work a bit like a television. Most kinds of television work from the same basic principle as the eyes and the brain. The tiny dots of light produced on the TV screen, called pixels, flash according to a specific pattern provided by the video signal. A person’s eyes transmit this pattern to the brain, where it is interpreted as a recognizable image. www.wisegeek.com/how-does-a-television-work.

Remote Neural Monitoring is said to be used by perpetraitors to send images direct to the visual cortex of a TI, bypassing the eyes and optic nerves, to create optical illusions – www.emhdf.com/akwei.  So presumably it could receive images from the visual cortex in the same way.  This would mean that perpetrators could use Remote Neural Monitoring to see what the TI was seeing.

Are there tactics that TIs can use to provide appropriate feedback to perpetraitors? There are sound frequencies that perpetraitors do not like, because of the way psychotronics works, including:

  • Rustling and crunching of cellophane, supermarket plastic bags and tissue paper.  The noise should be made loud and close to the TI’s head.  Do not be surprised if the perpetraitors temporarily turn off their communication links. Yes, they can turn the links off, and they will turn them back on a bit later.
  • A similar effect can be achieved by scratching cutlery on ceramic plates.
  • High pitched frequencies such as those played on Solfegio tones – from www.lifetechnology.org/solfeggio are also effective.

Strange as it may seem, there are repellent images that perpetraitors do not like thrown their way.  If they express interest in something revolting, call their bluff.  Create a strong visual image of what they are focused on – or something equally revolting – and send it back down the psychotronic line, visualising it falling all over them.  From what I have read, their equipment can show mind pictures on a screen, so you can provide both mental and visual feedback.



Mask images taken from:


This blog was published despite repeated attempts to interfere with my computer display drive function, and alteration of the text.  Apparently, this can be achieved using satellite technology remotely – from another country for example.