You are on page 1of 11

INDEXDOCUMENTATIONSSCRIBDDIAPORAMAFACEBOOKCVBENJAMINSIMONIMAGESBOOK DOCUMENTATIONDOMESTICTERRORISMI.R.S.D.

PROJET2012

Ce site dcrit un crime actuel qu'est le GANGSTALKING, mconnu car sous couvert, hyperinvasif et destructeur que des rseaux dassassins perptrent via logiciels et ondes sous la forme de ractions enchane et de jeux d'ordures issus de protocoles nazis (nazis pigs theorem, obedience to authority, karpman deviances, ratswares, spywares network, worm, trackers, mkultra, domestic surveillance, brain tapping, hearing for the deaf, silent sound, human tracking, coils,microwaves,radar,troughthewall,stalkers).
Le11Novembre2012,

WHYPINKFLOYD? TMSW7905.1isprobablythereferenceofthedevicesusedtomonitorthisnazinetwork.
WhatisaPerpetrator? A Perpetrator is anyone who has been trained to harass, torture, maim,andkillaTarget,eitherbydirectmeans,orbycovertmeans including,electronic,biological,oraccidentalmeans.Careerperps make a good living dealing misery to hapless individuals. Perps usuallydonotknowthevictimpersonally,butaresuppliedenough information to allow a well oiled campaign of gang stalking and harassment.http://emhdf.com(allanBarker) Hwaves,Hacheuse,Digital,Troughts,Perpetrators,Rotshild, Surveillance,Domesticterrorism,Snitching,Chemtrails,Tapping, Subvocal,PeopleCookers,Masint,Maser,Triangle,TM SW7905,Diffraction,Echelon,Multivictims,Stalking,Waves guides,WHYPINKFLOYD?

ItisaworkofSecretPoliceCorpsatNATO level. They involve, as militians, louses of whatever political colour or without. Even universities as the UCL in LLN, Wallonie, from the Rector/Doyen to professors, researchers and students.RobertoScaruffi GangStalking isstalkingbymorethanonepersontoavictim,usuallyinvolvingcommunityharassment,orthe"mob",using peoplefromallbackgroundsandvocationstoharass,tracking24/7,sometimesorganizinglethalvehicleaccidents,poisoinings, electronicharassment,homeinvasions/propertydestruction,corruptorignorantdoctordiagnosisgiventostampthevictimas bogusmentallyillwithdelusions,paranoi,orschizophrenia,etc.(http://www.urbandictionary.com/)
GROEPSTALKINGiseenmethodedie(meestaldoor=veiligheidsdiensten)wordtgebruiktommensenteelimineren.Hooewel

het=eigenlijkomveiligheidvanstaatofanderszoumoetengaanblijktinde=praktijkdatgroepstalkingvaakgebruiktwordt omwillekeurigegewone=mensenomnietszeggenderedenenaftemaken.Groepstalkingofgang=stalkinggebeurtmeestalin combinatie met geavanceerde electronische = wapens, Directed Energy Weapons, DEW, mensenbrander, people zapper, = electromagnetischewapens.PeterMooring The buzzsaw is a powerful system of censorship in this country that is revealed to those reporting on extremely sensitive stories,usuallyhavingtodowithhighlevelgovernmentorcorporatemalfeasance.Itoftenhasafataleffectononescareer. A journalist who has been through the buzzsaw is usually described as radioactive , which is another word for unemployable.http://www.opednews.com/ ChainReaction

Whatisclearafterresearchingtheinformantsystemisthatthereisachainreactionhappeninginsocietyandthatchainreaction is at the heart of much of the corruption that we are seeing in our legal system and other sectors of society. This system is responsible for enslaving and transforming large portions of communities into informants. Once a target is turned into an informanttheyinturnaresentbackoutintosocietytorecruit,entrap,andturnothersintoinformants.Manyinsocietyarenot aware that this is happening. When it comes to Gang Stalking many people feel that it would be impossible or just too expensivetohavesomeonemonitoredandplacedundersurveillance24/7,muchlessarrangingtohavethemtrackedthisway when they moveorchangejobs,butwhatresearchinto the informant system and the chain reaction thatis occurringwithin society has shown is that it is very possible. This chain reaction that is happening within society if left unchecked has the potentialtoinfectanddestroytheverycoreofsocietythatweknowandaredependentupon.Theinformantsystemisan infectiononthesoulofsocietyandifnotcureditcouldintimebecomemalignanttotheverysocietyitwasdesignedtoassist. www.GangstalkingWorld.com,Bailey Groepstalking Oorsprong:GroepstalkingiseenfenomeendatwaarschijnlijkoorspronkelijkindeVSisontwikkelddoordeKuKluxKlanen gebruiktwordtom'ongewensteelementen'uithunomgevingteverdrijven. Doel van groepstalking: zelfmoord Groepstalking komt voor in westerse landen en is een onderdeel van een verfijnde methodeommensenuitteschakelen.Hetslachtoffermoetgeisoleerdworden,werkeloos,uitgeputen(financieel)afhankelijk gemaakt,maarvooralbuitenzinnenwordengebracht.Hetdoelvandezemethode(metgroepstalkingalsonderdeelvan),isdat het slachtoffer zelfmoord pleegt, gepsychiatriseerd raakt, zijn buren aanvalt en/of vermoord, e.d. Dus, de geestelijke en/of lichamelijkedoodvanhetslachtoffer.Datmaaktdegenendiehieraanmeewerkenmedeplichtigaanmoordmetvoorbedachten rade of anders gezegd, moordenaars. Het is belangrijk te realiseren dat de meeste mensen die dit aangedaan wordt niet eens zullenbegrijpenwathunpreciesoverkomt.http://www.petermooring.nl DomesticWarRoomsC2Centers Military campaigns have been typically directed from war rooms. They are also called command centers, or command and controlcenters(C2).AC2centerisamilitarytermforastationwhichallowstheplanning,directionandcontrolofoperations, monitoring,decisionmaking,andexecution. Thewordcommunicationswasaddedtothisterm,makingitC3,andeventuallycomputerswereadded,amountingtoC4.Itis nowreferredtoasC4ISRwiththeadditionofintelligence,surveillance,andreconnaissance.4Amoredetailedexplanationof thistermfollows. Commandistheformulationofintentsuchasplanning,controlistheinformationobtainedfromtheresultsoftheactiontaken, aswellastheconclusionastowhetherornottheactionwassuccessful.Communicationsandcomputersarethehardwareand softwareusedtoimplementthecommandandcontrol. Intelligence, surveillance, and reconnaissance are the hardware and software systems of sensors, people, data collectors, and platformsaswellastheuseoftoolstoextracttheinformationfromdata.ThesearecollectivelyreferredtoasC4ISR.MRich http://www.thehiddenevil.com/ SilentSoundTechnology"Squad" Silent(convertedtovoiceFM)hypnosiscanbetransmittedusingavoicefrequencymodulatortogeneratethe"voice."Itisa steadytone,nearthehighendofhearingrange(15,000Hz),plusahypnotist'svoice,varyingfrom3004,000Hz.Thesetwo signalsarefrequencymodulated.Theoutputnowappearsasasteadytone,liketinnitus,butwithhypnosisembedded.TheFM voicecontrolsthetimingofthetransmitter'spulse.http://richardalanmiller.com/ Throughwallsurveillancemethods: Thisincludestopendofmicrowave(nearinfrared),andthesocalled"millimeterwave"scanning.Thismethodusestheverytop endofthemicrowaveradiosignalspectrumjustbelowinfrared.Toviewsmallobjectsorpeopleclearly,thehighestfrequency thatwillpenetratenonconductiveorpoorlyconductivewallsisused. Millimeter wave scanning radar can be used in two modes: The first is passive (no radiated signal) and uses background radiation already in the area to be scanned. It is totally undetectable. The active system uses a (low power millimeter wave) "flashlight"attachedtothescanner.http://richardalanmiller.com/ EMFBrainStimulationworksbysendingacomplexlycodedandpulsedelectromagneticsignaltotriggerevokedpotentials (events) in the brain, thereby forming sound and visual images in the brain's neuralcircuits. EMF Brain Stimulation can also changeaperson'sbrainstatesandaffectmotorcontrol.TwowayElectronicBrainLinkisdonebyremotelymonitoringneural audiovisualinformationwhiletransmittingsoundtotheauditorycortex(bypassingtheears)andtransmittingfaintimagestothe visualcortex(bypassingtheopticnervesandeyes,theimagesappearasfloating2Dscreensinthebrain). http://www.freedomfchs.com/remoteneuralmonitoring.pdf Thepigsexploityourdesperation.Youareundertorture.Youarerightfullydesperate.The"badNazi"isharassingyou. Sothe"goodNazi"hasanopportunity.The"goodNazi"keepspromisingtohelpyou.Asatorturevictim,youtendtokeep paying attention to the "good Nazi," because there is no alternative. In the "real" world no one even knows (or admits to knowing)whatisgoingon.Youareunderanintolerabletorture.The"goodNazi"exploitsthis.The"goodNazi"caneven

turn"badNazi"fromtimetotimeandthevictimwillstaytunedin,becausethatseemstobetheonlyhope.The"goodNazi" willpromisehelpandanythingelse,aslongasitisonlybetweenthelinesorotherwisedeniable.The"goodNazi"canappear onanyFIP,forexampleasanothervoiceonthenonconsensualvoice kullsend.Oritmightbeacollaboratoronanormally to s legitimatechannel pigsataMockingbirdnewspaper,forexample.Butifyoubuythebaittheydangletoadesperatehuman beingundertorture,theythenstarttryingtomanipulateyou.Whoops!Ifonlyyouhadn'tdonethat!Well,yourfreedomwas alllinedupifyouhadn'tdonethat!Yourbasichumanrightswillberestoredsoon,ifonlyyouwill...Nazispigtheorem.PartIV: BayesianStoppingCritireonandtheOptimizationThereom,AllenBarker SilentweaponsforquietwarsAnintroductoryprogrammingmanual,OperationsResearch,TechnicalManualTMSW7905.1 Thispublicationmarksthe25thanniversaryoftheThirdWorldWar,calledthe"QuietWar",beingconductedusingsubjective biologicalwarfare,foughtwith"silentweapons".Thisbookcontainsanintroductorydescriptionofthiswar,itsstrategies,and itsweaponry.Itispatentlyimpossibletodiscusssocialengineeringortheautomationofasociety,i.e.,theengineeringof social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of socialcontrolanddestructionofhumanlife,i.e.,slaveryandgenocide. Withthecreationofthemaserin1954,thepromiseofunlockingunlimitedsourcesoffusionatomicenergyfromtheheavy hydrogeninseawaterandtheconsequentavailabilityofunlimitedsocialpowerwasapossibilityonlydecadesaway. Thecombinationwasirresistible.TheQuietWarwasquietlydeclaredbytheInternationalEliteatameetingheldin1954.This volumemarksthe25thanniversaryofthebeginningoftheQuietWar.Alreadythisdomesticwarhashadmanyvictorieson manyfrontsthroughouttheworld.Googlesearch:silentsound,quietwar,genocides,falseflags,mindslaves,harrassment, mindreading,TMSW7905.1,OS/EH?Hwaves,sanguine,humanmonitoring.
ElfEEGEntrainmentsanguineHpsychotronicmonarchAllanBarker.pdf sharpmaserSilentweaponsforquietwarsRotchilTechnicalManualTMSW7905.1.pdf

TheprimarypsychiatricdiagnosticmanualusedwithintheUnitedStatesandmanyotherwesterncountriesistheDiagnostic andStatisticsManualIVTR(DSMIVTR),whichiswrittenandpublishedbytheAmericanPsychiatricAssociation(APA, 2000).Basedonmyunderstandingofitscontents,whichisinformedsomewhatbyaBachelorofSciencedegreeinPsychology (nonclinical)andspendingclosetoadecadeinpsychotherapyasapatient,peoplewhoclaimthattheyarebeingstalkedby multipleperpetratorscouldreceiveadiagnosisofpersecutorydelusionaldisorderorparanoidschizophrenia.RobinB. Webster Linvalidationdecertainsphnomnescommelestalkingorganisationnelparlesforcesdelordreetlespsychiatresau profit dallgationsfallacieusessurledliredeperscutionoulaschizophrnienoussemblentdespostulatsdpassslheuredela radiogoniomtrie,delexistencedesnacellesdecontrlevisuelquipantleschasseurs(leRafale,leMirage,leF16,etc.) etdelensembledemoyensdesurveillancedontdisposelindustriepolicireetscuritaire.LesCahiersdujournalisme,Nicolas Desurmont(Belgique)
PETITIONOVER1300TORTURECASES

ThisletteristoaskforyourhelpforthemanyvictimswhoarebeingattackedwithPsychotronic(orMindControl,Electronic, Directed Energy, Neurological, Nonlethal) Weapons. Some of our ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATIONCASESdetailthemostextremeandtotalitarianviolationsofhumanrightsinhumanhistory,including themosthorrendouspsychologicaltortures,rapes,sexualabuse,physicalassaults,surgicalmutilations,mindcontrol,andother mental and physical mutilations. Among other things the perpetrators of these crimes can place the human subject under continuous surveillance no matter where he/she is they can monitor the human brain, including thoughts, reactions, motor commands, auditory events and visual images they can continuously alter consciousness, introduce voices, noises, other disturbances,commands,imagesand"dreams"intothebrainandtheycandirectlyabuse,tortureandhitbodiesincluding performingadvancedmedicalproceduresfromremotelocations.Thetechnologytheyareusingissoadvancedthatitallows thecontroller(s)toseethroughtheeyesofthetargetedindividual,essentiallyseeingwhateverthevictimsees.Manyofusare beingtorturedandabusedintheseways24hoursaday,7daysaweekyearinyearout.http://gangstalkingbelgium.net/media releasein15languagesjohnfinch/ AlainWinants(SretdelEtat):LaBelgiquefaitunpeuplefigure Pour Alain Winants, administrateur gnral de la Sret de lEtat, les cyberattaques constates jusquici en Belgique, bien quellessoientenrecrudescence,nontpasencoremontrdecasdecyber sabotage,quirsultedansladestructiondematriel ou de donnes (comme ce fut le cas en Iran avec Stuxnet). Mais en matire de cyberscurit, notre pays est bel et bien en retard.QuanduneadministrationcommelesAffairestrangresestaujourdhuiattaque,quitrouve t onderrirecesattaques? LaBelgiqueest ellecapabledesedfendre? Il ny a pas encore au niveau belge de plan de cyberscurit gnral dans lequel la Sret pourrait sinscrire avec dautres partenaires, et dans le cadre duquel nous pourrions nous rpartir les tches. La Sret, seule, nest pas mme dassurer ce genrederesponsabilit:elledoittravailleravecleSGRS,leFCCU(NDLR:FederalComputerCrimeUnit),etc.Onesten traindlaborerdepuisuncertaintempsdj,auniveaudugouvernement,unplangnraldanslequelilfaudratoutlafois prendre en considration les cyberattaques, la cyberdfense, la cyberscurit et la protection physique des infrastructures

critiques.Lesoir,LallemanA. Gang stalking = maninthemiddle attack, spoofing. Techniques applique par les terroristes dans ltendue du spectre electromagntique et pour tout les moyens de communications non physiques et francs. (recording + speech to word to speech recognition in real time, emailing,web, gsm, radios, forums, facebook, fax, mailing, databases, banks, inssurances ..).http://gangstalkingbelgium.wordpress.com/ Computersecurity,themaninthemiddleattack(oftenabbreviatedMITM)[1]isaformofactiveeavesdroppinginwhichthe attackermakesindependentconnectionswiththevictimsandrelaysmessagesbetweenthem,makingthembelievethattheyare talkingdirectlytoeachotheroveraprivateconnection,wheninfacttheentireconversationiscontrolledbytheattacker.The attackermustbeabletointerceptallmessagesgoingbetweenthetwovictimsandinjectnewones,whichisstraightforwardin manycircumstances(forexample,anattackerwithinreceptionrangeofanunencryptedWiFiwirelessaccesspoint,caninsert himselfasamaninthemiddle).FromWikipedia,thefreeencyclopedia TobegintheattacktheperpetratorcanputalinktothefalseWWW(acopy)onawebsitethattheyknowthetargetvisits.Or theycansendthetargetanemailwithalinktothefalseweb.Theymayalsobeabletogettheirfalsewebindexedonasearch engine. These attacks can be launched using an unwitting persons PC as a proxy which would conceal the location of the perpetrators.Mostofthecluesthatwouldalertatargetthattheirwebhasbeenspoofedcanbeconcealed.Oneisthestatusline locatedatthebottomofmostbrowsers,whichprovidestheaddressofawebsitethatsintheprocessofloading.Normally,ifa userclicksonasite,thestatuslinerevealstheactualsitebeingloaded,regardlessofthelabelonthehyperlinkthatwasclicked. Also,theURLlocationlineatthetopofmostbrowserswheresitescanbetypedin,willdisplaythecurrentsite. MRichhttp://www.thehiddenevil.com/ Le domaine C4ISTAR (Command, Control, Communications and Computers for Intelligence, Surveillance, Target AcquisitionandReconnaissance)regroupeunelargegammedesousdomainesetdetechnologiesettouchediffrentstypesde donnes(voix,images,vidos,fichiers,messages,fax).IlparticipelaralisationduconceptNetworkEnabledCapability (NEC). LamliorationconstantedessystmesC4ISTARresteundomainedintrt.Quellesquesoientleurslocalisationetdimension, la structure de commandement et les circonstances, il envisage lintgration rseaucentre, automatique, cohrente, souple, modulaire,adaptable,agileetflexiblededtecteurs,desystmesC2,devecteursetdeffecteurs,etlamliorationdela diffusion, du partage et du traitement de linformation. Les systmes Command and Control (C2) doivent permettre dobtenirunemeilleurecapacitISTARenoprations.Ilsdoiventsurveillerlenvironnementscuritaire,fairedelaprvention, identifieretneutraliserlesmenacesetcontenirleurseffetsleurminimum,protgerlesinfrastructuresetzonessensibles. Dansledomainedescommunications,cettenichecomprendlespectrecompletdescommunications(sansfil)etlesdiffrentes manires de scuriser diffrents niveaux ces communications. Pour des applications militaires, ces rseaux doivent tre robustes,lgers,fiablesetinteroprablestouslesniveauxoprationnelssansperdredevuelesaspectsdeselfconfigurability ,deredondanceetdequalitdeservicesetlesmesuresdeguerrelectroniqueetdecyberwarfareouCNO(ComputerNetwork Operations).Auseindeladfense,laccentestmissurlesapplicationsNCO(NetworkCentricOperations),letoutenrseau ,letoutsurIP(InternetProtocol)tantauniveauservicesquerseaux,fixeset/ou(semi)mobiles,civilset/oumilitairesdont parexempleleprogrammedacquisitiondelaradiodufutur:laSDR(SoftwareDefinedRadio).Appel_a_projets_F_2012,Jean PaulMARCELhttp://www.irsd.be http://gangstalkingbelgium.net/2012/08/16/lathesedel4irsdappelaprojet2012commandandcontrolcnocounterterrorism
NEWS/OPENMINDCONFERENCE20122023SEPTEMBER/DENMARK/SKANDERBORG/AUDONICON ICAACT.ORGishonoredtohavetheopportunitytoparticipateinagatheringofsomeofthebrightestmindsoftoday.Wehave

beenaskedtogiveapresentationaddressingRemoteInfluencingTechnologies,TheNewTerrorismofthe21stCentury. Special guest will include Dr. Barrie Trower (British Physicist), Niels Harrit (Chemistry Professor), Rasmus Foldbjerg (MolecularBiologist),LarsDrudgaard(ICAACT),andothersofprestiegeandinfluence.ICAACTiscommittedtoeducating thepublicandrepresentingvictimsofelectronicterrorismthroughouttheglobe.http://www.icaact.org/ BenjaminSimon
http://gangstalkingbelgium.wordpress.com/presse/ http://peacepink.ning.com/profile/bsimon http://www.scribd.com/bensim24 http://fr.gravatar.com/bensim23 http://www.chauffage-indusriel.be/ http://gangstalkingenwallonie.blogspot.be/ http://gangstalkingbelgium.wordpress.com http://gangstalkingbelgique.blogs.dhnet.be/ http://www.gang-stalking.be/ http://www.linkedin.com/pub/simon-benjamin/50/337/5a1

Il y a 3 ans que ces assassins sont sur mon dos et deux ans et demi de harassement 24h sur 24 7 jours sur 7 par silent-sound et que tout m'est sabot vis par des armes nergie diriges. Le 6 octobre 2012, Je me suis rendu un meeting l'universit de Ghent organis par http://icaact.org/. (Jesse Beltram, Barrie Trowers, Lars Drudgaard, ...) L'universit mettait aimablement ses locaux et sa chambre anchoique notre diposition et deux spcialistes trangers quip du matriel de mesure had-oc et bien sur brevet et calibr ont effectu les mesures. Les rsultats montrent que je suis vis "accroch" au niveau des tempes gauches et droites par une arme a nergie dirige emettant du silent sound sur une frquence trs prcise (chiffres exacts et vido de la sance de mesure disponible). Nous tions une douzaine pour lesquels les mesures taient positives ainsi que quelques temoins. Cette technique de harassment verbal se nome "voice to skull". Le silent sound est l'arme par excellence de la guerre avec des armes nergie dirige emit par des ordures pour le tracking, le mind-blowing, l'espionnage ainsi que la torture physique. (echelon, tempest, mk-ultra, monarch, illuminati terrorism, ..)
PleasefindherwiththeICAACTinBrusselsinterviewdonebyAntonGlasfrom"TransparantVlaamsNederlandsRadio".

http://icaact.org/audio/brusselsradio.mp3

Bibliography BenjaminSIMONCVCOINTELPROGangStalkingCoverup11Novembre.pdf SecretPoemBenjasimonWordpressCom.pdf GangstalkingTheperpetratorwouldyouwantthisjob.pdf ElfEEGEntrainmentsanguineHpsychotronicmonarchAllanBarker.pdf sharpmaserSilentweaponsforquietwarsRotchilTechnicalManualTMSW7905.1.pdf

NAZISPIGSTHEOREM.PartIV:BayesianStoppingCritireonandtheOptimizationThereom,Allen Barker.pdf LesecretdelamicropucecerebralejanssencilagrisperdalSydBarett.pdf AboutpsychotronictechnologyAlanYu.pdf


CommandandcontrolwarfareHutcherson.pdf MILAppelaProjetsF2012counterterrorismCRBN.pdf groepstalkingnederlandsPeeterMooring.pdf mindcontroltechnologiesAllanMiller.pdf

ASituationistPerspectiveHowPeopleAreTransformedintoPerpetratorsPhilipZimbardo.pdf
OpticalMaserssyntheticapartureradar.pdf DesurmontCommunicologieetradiophoniedesfinsmilitairesauxfinsducatives.pdf PsychotronicFrequencyNASAFORDAnalysisoftheLakhovskyMultipleWaveOscillatorfrom20Hzto20 GHz.pdf FORDNASAanalogtodigitalconverter.pdf

GangstalkingPETITIONTOYOUOURSELECTEDWITNESSESover1300TORTURECASES.pdf remotevoicedetectionsystemwarfarenewport.pdf groepstalkingnederlandsPeeterMooring.pdf MindControlmonarch.pdf ROMANCEHISTORICODEMEDICINApsychotronicfreyrnmelfWellingtonAntonioDoninelliPereira.pdf JohnStClairAkweiNASAdomesticsurveillanceFtMeadeMDUSA.pdf EleanorWhitegangstalkingcopying2011.pdf mindcontroltechnologiesAllanMiller.pdf AnthonyForwoodTheNetworkcointelprooseh.pdf


ASTUDYOFHIGHSPEEDADANDDACONVERTERSUSINGREDUNDANCYTECHNIQUES.pdf

ATVTransmitterfromaMicrowaveOvengangstalking.pdf NatoGatedUWBFMCWSFRadarforGroundPenetrationandThroughtheWallApplications.pdf MemoireAlexisJungLacreationsonoredanslefilmfantastiqueaucinema.pdf fordnasaanalogtodigitalconverter.pdf FRpackdroitsdelHomme.pdf

cointelprowebopsCNOmaninthemiddelattack.pdf MonsieurAppartProcureurDuRoiDinantGangStalkingPublique.pdf GoogleGangStalkingBelgiumBenjaminSimonCiney.pdf

MINDCONTROLWEAPONS.pdf BelgiqueunecibletropfacileencasdecybersabotageAlainWinantLALLEMAND20juin2012.pdf echeloncarnivore.PDF Duncanetcomiterechelonbelgium.pdf ih98tempest.pdf measurementsdiffpatternwithnoises5988.pdf SuretedelEtatBelgiqueVsseWwwgangStalkingBelgique.pdf ladswebmonitoring.pdf LuxembourgstoaCOMINTtargettingandselectionincludingspeechrecognition2000.pdf echelonsenat2002comiterAnneMarieLizin.pdf Mediadecreet27maart2009.pdf GangStalkingCOINTELPROTerroristScreeningProcess.pdf

100USPatentAbstractsMindControlNeuralManipulationbyEMFieldsandOtherPatents.pdf bridginthegapBailey.pdf JohnMcMurtreyInnerVoiceTargetTrackingBehavioralInfluenceTechnologies.pdf DavidLivingstoneTerrorismandtheIlluminati.pdf elftransmitterreceiver.pdf DeclassifiedDocumentOnElectronicHarassment.pdf WalterBowartOperationMindControl.pdf Garganodewpersonaltrackingrecoverysystem.pdf MicrowaveHarrasementandMindControlExperimentation.pdf armesaenergiedirigeeallemagnepreventionterrorismepolice.pdf

synthetictelepathyearlymindwarsRichardAlanMiller.pdf LifeassessmentdetectionsystemFreyAllanHumanauditorysystemsresponsetomodulatedelectromagnetic energy.pdf MillimeterRadiosWhitePaper24ghzinterceptionsystem.pdf MarkRichNewWorldWarRevolutionaryMethodsforPoliticalControl2010.pdf C4ISRGapdodinventory.pdf FarFieldMillimeterWaveImagingviaOpticalUpconversion.pdf VictimsofOrganizedStalkingDelusionalSchizophrenicortheTargetsofPsychiatricPersecution.pdf

Links
http://shopofenlightenment.com/forum/psychotronictechnologiesassilentweaponst1422.html http://www.elfis.net/elfol6/e6mkc.htm http://www.elfis.net/elfol4/e4pkdomc.html http://geeldon.wordpress.com/2011/02/20/maserbeamsreadingsubvocalisedthoughts/ http://tesla.stumblers.net/ http://saiinssiet.blogspot.be/p/blogpage.html http://www.qsl.net/w5www/taoshum.html http://tallbloke.wordpress.com/2011/07/07/theluxembourgeffect/ http://psychicinvestigator.com/demo/psychotronic.htm#oogleto:http://psychicinvestigator.com/demo/ http://metaphysicalradionics.com/ http://www.illuminatinews.com/index.htm http://www.plusultratech.com/2010/11/psychotronicwarfare.html http://www.plusultratech.com/ http://nexusilluminati.blogspot.be/ http://www.mindthemoon.com/ http://www.pakalertpress.com/2012/04/08/putinreportedlyconfirmsthatrussiaisactivelyworkingonpsychotronicweapons/ http://en.wikipedia.org/wiki/Project_Sanguine http://www.vxm.com/bib.doc.html http://cryptome.org/whodeceives,whowatchthewatchmansTheConflictBetweenNationalSecurityandFreedomofthe TheSuccorPunchOrgoneGenerators http://ce399.wordpress.com/ http://www.polyphasemicrowave.com/ http://www.rma.ac.be/ http://www.zp5314.be/ http://www.mil.be/def/index.asp C4ISTARforHackingandCyberConflict(decisionstats.com) DoDCoverUp:GitmoDetaineeFoundHangedWithHandsTiedBehindBack(my.firedoglake.com) NecessarySpending?(misbehavedwoman.wordpress.com) Mindcontroleurope..(2008)(gangstalkingbelgium.wordpress.com) TheNSAsGlobalSpyingNetwork(powersthatbeat.wordpress.com) SatelliteMindControlBioelectricWeapon(gangstalkingbelgium.net) Murder,Inc.StateAssassinations(powersthatbeat.wordpress.com) GangStalkingYouthinkyoucantloseyourfreedom?Thinkagain!(neverending1.wordpress.com)

http://geeldon.wordpress.com/2011/09/06/whatismindcont...(gangstalkingbelgium.wordpress.com) Debunking10MythsAboutTheCIAsPsychologicalOccupationofTheAmericanMind(blacklistednews.com) WaysIHaveBeenTorturedInThePast18Years(mindcontroljustice.wordpress.com) PatentsandInventorsofSatelliteMicrowavedeliveredtechnology(gangstalkingbelgium.wordpress.com) Ark.judgefinesJohnson&Johnsonmorethan$1.1BinRisperdalcase(cbsnews.com) J&JMarketedRisperdaltoKidsDespiteWarnings,JurorsTold(businessweek.com) A+KIDS:ImportantInformationforChildrenwithASDwhoReceiveBehavior Medications(autismsocietyofnc.wordpress.com) TheMarketingofantipsychoticRisperdaltokids:Iwasbynowfullyalertandfightingtheimpulsetostandupandsay,Are youserious?thetrial(bipolarsoupkitchenstephany.blogspot.com) Newborninfantsexperiencewithdrawalfrompsychiatricdrugs(beyondmeds.com) GangStalkingHandsignalsusedbyNazisandstillusedtodayinU.S.(neverending1.wordpress.com)

Thispagehttp://www.nazis.be/Theperpetratorcointelpro.html

Please,link,copy,paste,serve,distribute,inform,insist,publish,postthispage. Trytounderstandthiswebsiteandfightagainstthebuzzsaw....

CouldyousupportmycandidacysothatIcompletethisworkinextremeemergencyonfield?

Seekingfunding,helpers........... Seekingradiooperatorequiped,understanding.....
Benjamin.Simon 27 ruelle Burton 5340 Gesves

You might also like