We have linked to much content in order to share information about the Targeting program, all information is the opinion of individuals that have shared content online. Please research this subject and form your own beliefs. Gang Stalking is a crime that is being reported across the nation by thousands of people. All reporting the same crimes being committed against them.

The Persecution of Innocent Civilians has grown dramatically since the passing of the Patriot Act and the creation of the Corrupt FISA courts. State and Local Police, FBI, Fusion Centers, NSA, DOJ, Homeland Security, Citizen Corps, Freedom Corps, Infraguard, National Neighbourhood Watch and many other intelligence agencies are involved in the targeting program that targets innocent Civilians who are never afforded the right to a trial.

https://www.targetedjustice.com          https://www.justiciatargeted.com          https://www.targetedmassachusetts.org/

https://anonymousworldwide.com

NNW.ORG                                                                                          BJA.OJP.GOV

Nobel laureate, and Holocaust survivor.
https://anonymousworldwide.com

When authorities block Twitter, Facebook or …, here how u can go around blockade. Most of the time, your ISP automatically assigns a primary and secondary DNS server when your router or computer requests network information via DHCP. But what if those ISP-provided DNS servers aren’t working properly or “they” block certain sites? Ways to connect when authorities block services:

The term Gang-Stalking or Organized Stalking refers to intense, long term surveillance of a civilian. There is much documentation that is available online. Links are given at the bottom of this Page.

Please register to share post, videos, and testimony about the crimes being committed against Targeted Civilians Worldwide.

If you or someone you know is experiencing this type of crime please call PACTS International at: 1-888-639-5559

If you or someone you know are witness to this type of crime please document all criminal activities witnessed and email documentation to: investigations@targeted.one

Senior NSA veterans J. Kirk Wiebe and William (Bill) Binney speak with leaders of the “Targeted Individual Community” about a new scientific attempt to understand victims’ claims of electromagnetic assaults and related covert harassment. These former NSA whistleblowers and current American heroes answer questions from prominent targeted individuals about the new “Global TI Survey”, which was launched on June 19, 2017.

New York Times Reports on NSA Surveillance:

The N.S.A. domestic spying operation has stirred such controversy among some national security officials in part because of the agency’s cautious culture and long-standing rules.

Widespread abuses — including eavesdropping on Vietnam War protesters and civil rights activists — by American intelligence agencies became public in the 1970’s and led to passage of the Foreign Intelligence Surveillance Act, which imposed strict limits on intelligence gathering on American soil. Among other things, the law required search warrants, approved by the secret F.I.S.A. court, for wiretaps in national security cases. The agency, deeply scarred by the scandals, adopted additional rules that all but ended domestic spying on its part.

The legal opinions that support the N.S.A. operation remain classified, but they appear to have followed private discussions among senior administration lawyers and other officials about the need to pursue aggressive strategies that once may have been seen as crossing a legal line, according to senior officials who participated in the discussions.

For example, just days after the Sept. 11, 2001, attacks on New York and the Pentagon, Mr. Yoo, the Justice Department lawyer, wrote an internal memorandum that argued that the government might use “electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies in order to intercept telephonic communications and observe the movement of persons but without obtaining warrants for such uses.”

Mr. Yoo noted that while such actions could raise constitutional issues, in the face of devastating terrorist attacks “the government may be justified in taking measures which in less troubled conditions could be seen as infringements of individual liberties.”

The Infringements on these liberties have now became widespread in the program that Targets Innocent Civilians, and have led to the deaths of a untold number. Besides the physical torture that our intelligence agencies are now at liberty to use abroad, we see also the use of psychological torture alongside electronic warfare technology. The very same technology that has been used in the Syrian, Iraqi and Afghanistan conflicts, as well as against the US Diplomats in Cuba is used on a daily basis on Civilians worldwide.

John Yoo Torture Memos PDF:John_Yoo_army_torture_memo-1Download

We conclude below that the Fifth Amendment Due Process Clause is inapplicable to the conduct of interrogations of alien enemy.combatants held outside the United States for two independent reasons. First, the. Fifth Amendment Due Process Clause does not apply to the President’s conduct of a war. Second, even if the Fifth Amendment applied to the conduct of war, the Fifth Amendment does not apply extra-territorially to aliens who have no connection to the United States. We address each of these reasons in turn.John_Yoo_army_torture_memoDownload

As Attorney General Speed concluded, the Due Process Clause has no application to the conduct of a military campaign: That portion oithe Constitution which declares that ‘no person shall be deprived.. . of his life,liberty, or property without due process of law,’ has such direct reference to, and connection with, trials for crime or criminal prosecutions that comment upon it would seem to be unnecessary. Trials for offences against the laws of war are not embraced or intended to be embraced in those provisions…. The argument that flings around offenders against the laws of war these guarantees of the Constitution would convict all the soldiers of our anny of murder; no prisoners could be taken and held; the anny could not move. The absurd consequences that would of necessity flow from .such an argument show that it cannot be the true construction-it cannot be what was intended by the framers of the instrument. One ofthe prime motives for the Union and a federal government was to confer the powers of war. If· any provisions of the .. Constitution are so in conflict with the power to carry on war as to destroy and make it valueless, then the instrument,instead of being agreat and wise one, is a miserable failure”a felo de se.

CNN “NEWS”

SONIC ATTACKS ON US DIPLOMATS IN CUBA

Investigative journalist Will Potter is the only reporter who has been inside a Communications Management Unit, or CMU, within a US prison. These units were opened secretly, and radically alter how prisoners are treated — even preventing them from hugging their children. Potter, a TED Fellow, shows us who is imprisoned here, and how the government is trying to keep them hidden. “The message was clear,” he says. “Don’t talk about this place.” Find sources for this talk at willpotter.com/cmu TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world’s leading thinkers and doers give the talk of their lives in 18 minutes (or less). Look for talks on Technology, Entertainment and Design — plus science, business, global issues, the arts and much more. Find closed captions and translated subtitles in many languages at http://www.ted.com/translate Follow TED news on Twitter: http://www.twitter.com/tednews Like TED on Facebook: https://www.facebook.com/TED

“After more than a year of research by the specialized agencies and experts from Cuba and the United States, it is confirmed that there is no credible hypothesis or conclusions adhered to science that justify the actions taken by the government of the United States against Cuba to the detriment of the bilateral relationship and with obvious political motivations,” the statement said.The Cuban response comes after the US withdrew two more people from the US embassy in Havana, Cuba, due to health concerns, according to a senior State Department official.The individuals in the “potentially new cases” of a mystery illness that has plagued embassy employees have undergone medical evaluations and were not yet “medically confirmed,” the official said. In the past, some officials have characterized the incidents at the embassy as “sonic attacks” or “acoustic attacks” because they have often coincided with a high-pitched sound. US officials have detailed how personnel in Cuba came to experience a variety of symptoms including sharp ear pain, headaches, ringing in one ear, vertigo, disorientation, attention issues and signs consistent with mild traumatic brain injury or concussion.

TIME.COM U.S. Diplomats in Cuba Were Injured by a ‘Sonic Weapon.’ What Is That?

Sound As A Defense Weapon: How Sound Frequency Can Cause Pain

www.forbes.com ELECTRONIC WARFARE

Modern warfare is waged largely on the electromagnetic spectrum. Although bombs and missiles get the headlines, they are just the kinetic step in a “kill chain” that relies heavily on electronic sensors and computers to detect, track, prioritize and target enemy assets. If the enemy is technologically advanced, it will be using its own array of electronic devices to deceive, disrupt or destroy attacking forces. These defensive measures will typically include methods for interfering with the electronic signals that smart bombs depend on for accuracy.

The struggle to control and exploit the electromagnetic spectrum makes today’s conflicts fundamentally different from those of the past. Although Sun Tzu understood 2000 years ago that success in war often depends on deception, the opportunities to confuse, disorient and demoralize adversaries have multiplied as the military enterprise came to depend so heavily on electronic tactics and tools. Electronic warfare thus is a central feature of military strategy for the foreseeable future.

Credible Sources:
This list shows 33 Medical Doctors, PhD Scientists, and former government agents that agree with our claim, that the U.S. government is using an illegal program of microwave targeting against civilians.  We encourage and support all Whistleblowers to come forward with their information.  Some of us are proud Whistleblowers and Political Activists, and would gladly do it again,

Dr John Hall, M.D. and author
Dr Katherine Horton, PhD Oxford Univ. Scientist
Dr Robert Middlebrook, PhD Professor
Dr Harold Mandel, M.D.
Dr Daniel Lebowitz, M.D.

Dr Max Williams, PhD, Professor & State Dept
Dr Barrie Trower, PhD government Scientist
Dr Michael Hoffer, M.D., Univ of Miami
​​​​Dr Colin Ross, M.D.
Dr Ed Spencer, M.D.
Dr Sue Arrigo, M.D.
Dr Douglas Smith, M.D., Univ of Penn.
Dr Terry Robertson, M.D.

Dr Robert Duncan, PhD former CIA engineer
Dr Doug Rokke, PhD government Scientist
Dr Eric Karlstrom, PhD Professor
Dr Nick Begich, Scientist
Dr Paul Batcho, PhD government scientist
Dr Paul Marko, PhD Psychologist
Dr Robert Steele, former CIA analyst
Dr Ben Colodzin, PhD Psychologist
Dr Curtis Bennett, Professor
Dr Corkin Cherubini, author
Dr Sean Andrews, Scientist
Willam Binney, NSA Whistleblower
Kirk Weibe, NSA Whistleblower

Karen Stewart, NSA Whistleblower
Carl Clark, CIA Whistleblower
Kevin Shipp, CIA Whistleblower
Mark Phillips, CIA Whistleblower
John DeCamp, Army intelligence Whistleblower

30 Free ebooks for TI’s by Richard Lighthouse.  

Right-click and Save-As.   You can download and read each one on your phone or computer.
Or see RLighthouse.com to find more.
His ebooks for TI’s are always free.  https://www.rlighthouse.com/store.html

the-governors-of-gangstalking.pdfDownload File satellites_weapons-of-the-af-space-command-1d.pdfDownload File treason-at-the-air-force-space-command.pdfDownload File
10reasons-prove-watchlist-fraud-1c.pdfDownload File scalar-weapons-targeted-individuals.pdfDownload File targeted-individuals-how-to-fight-back.pdfDownload File
advice-about-gangstalking-targeted-individuals.pdfDownload File the-microwave-torture-of-ed-snowden-julian-assange.pdfDownload File massive-fraud-at-att.pdfDownload File
targeted-individuals-standard-nomination-form.pdfDownload File manipulation-of-secondary-personalities.pdfDownload File ebook-template.docDownload File
listen-to-microwave-bullets-from-cell-towers.pdfDownload File preliminary-statistics-for-targeted-individuals.pdfDownload File ten-most-wanted-deep-state-criminals.pdfDownload File
how-to-disable-satellite-weapons.pdfDownload File us-violations-1967-outer-space-treaty.pdfDownload File more-officers-at-air-force-space-command.pdfDownload File
estimated-numbers-of-targeted-individuals.pdfDownload File psychiatric-fraud.pdfDownload File cell-towers-and-targeted-individuals.pdfDownload File
abolish-the-federal-reserve.pdfDownload File government-criminals-adobe-voco.pdfDownload File i-will-only-react-to-constructive-suggestions.pdfDownload File
rockefeller-rothschild-stock-data-2016-fraud.pdfDownload File treason-at-the-cia.pdfDownload File 34-patents-on-subliminal-mind-control.pdfDownload File
targeted-individuals-technical-information.pdfDownload File rockefeller-rothschild-dirty-money-london-stock-exchange.pdfDownload File cell-phone-hacking-the-nazi-stasi-academy-nsa.pdfDownload File
underground-portals-of-usaf-cia-1d.pdfDownload File top-50-websites-targeted-individuals-2a.pdfDownload File houston-gangstalking-boss-1c.pdfDownload File

The Daily Beast: The Loud, Obnoxious, 3,500-Year History of Sonic Warfare

U.S. officials have concluded that American diplomats in Cuba were exposed—deliberately, they claimed—to harmful, high-frequency sounds that caused hearing loss, headaches and nausea.

The sonic attacks compelled some diplomats to leave Cuba, the officials said. A Canadian diplomat also reported suffering hearing loss while working in Havana.

The alleged sound-based assaults are just the latest chapter in a long history of sonic warfare dating back millennia.

3,500 years ago, according to Biblical legend, an Israelite army blew trumpets and toppled the walls of Canaanite city of Jericho. Most historians agree that the Biblical account of the Battle of Jericho is fiction. But they also agree that weaponized sound has played an important role in combat and espionage throughout human history, perhaps inspiring the Jericho myth.

BELOW:

LINK TO INTERNET ARCHIVE NATIONAL EMERGENCY LIBRARY

Archive    Donate     Blog     Jobs     Volunteer    
Announcing The National
Emergency Library
During this unprecedented time in history, access to printed books is becoming difficult or impossible. COVID-19 is forcing students, educators, and everyday readers to rely on digital books more than ever before. That’s why the Internet Archive has temporarily suspended all waitlists, allowing you to immediately check out any of the 1.4 million books currently in our lending library. Until June 30th or the end of the US national emergency (whichever comes later), every borrowable book will be immediately accessible by anyone—creating, in effect, a National Emergency Library.
READ THE ANNOUNCEMENT
As of March 19th, almost a billion students around the world have been affected by school closures, obstructing their access to educational materials. Thousands of community and academic libraries have been forced to close their physical locations as well, further complicating the lives of readers. We hope that this new policy will provide everybody with the resources to keep reading—whether you need classic literature, science textbooks, genre fiction, or even just bedtime story material. We have also doubled the number of books you can check out at a time from 5 to 10, so borrow away!
START BROWSING
All these materials can also be found on Open Library—our online catalogue of published books. And not only can you find books in Open Library, but you can also curate and share reading lists, browse by genre to find new discoveries, and easily share what you’re reading on social media. If we don’t have the book in our collection, then the Sponsor A Book feature lets you decide what we digitize next!
VISIT THE LIBRARY
If you have questions about the new policy, you can browse our FAQ here. And if you want some tips and tricks for using our interface to read online, you can visit our help center!
GET HELP
Here at the Internet Archive, we believe that access to knowledge is a fundamental human right—and in a time of quarantines and school closures, providing that access is more important than ever. We hope that this change in our lending policy helps you find solutions during this period of uncertainty. 

Thanks for being one of our patrons.


-The Internet Archive Team
If you would like to make a tax-deductible donation to the Internet Archive, we would greatly appreciate your support. Thank you for helping us provide Universal Access To All Knowledge. 
DONATE TO THE INTERNET ARCHIVE

binney-affidavit-2017-07-05-finalDownloadthe-microwave-torture-of-ed-snowden-julian-assangeDownloadted_gunderson_affidavitDownloadelectromegnaticweaponsDownloadtop-50-websites-targeted-individuals-2aDownloadi-will-only-react-to-constructive-suggestionsDownloadjon_wilson_attorney_letterDownloadig-fbi-report-nov2019Downloadhsgac-fusioncentersDownloadfusioncenter_20071212Downloadgovernment-criminals-adobe-vocoDownloadcell-towers-and-targeted-individualsDownloadestimated-numbers-of-targeted-individualsDownloadfbi_domestic_investigations_and_operations_guide_-diog-_2013_version_part_01_of_01Downloadtargeted-individuals-how-to-fight-backDownloadthe-governors-of-gangstalkingDownloadtargeted-individuals-standard-nomination-formDownloadtargeted-individuals-technical-informationDownloadadvice-about-gangstalking-targeted-individualsDownloadlisten-to-microwave-bullets-from-cell-towersDownloadaffidavit_michael_m_texterDownloadlinda_l_dean_affidavitDownloadlinda_sharp_-_affidavitDownloadcori__ramirez_affidavitDownloadaffidavit-talinasimpsonDownloadaffidavit-robertearlewoodDownloadnotarized_affidavit_jack_christianaDownloaddominic_ruggiero_affidavit_officialDownloaddonald_anthony_bratcherDownloadmassive-fraud-at-attDownloadmichael_entressDownloadpreliminary-statistics-for-targeted-individualsDownloadpsychiatric-fraudDownloadrockefeller-rothschild-dirty-money-london-stock-exchangeDownloadrockefeller-rothschild-stock-data-2016-fraudDownloadrowena_estilloreDownloadscalarweapons1bDownloadscalar-weapons-targeted-individualsDownloadmanipulation-of-secondary-personalitiesDownloaddrdaniellebowitz1Downloadd-2slideoct2019-4.2cDownloadabolish-the-federal-reserveDownloadtreason-at-the-ciaDownload95mkultraDownloadtreason-at-the-air-force-space-commandDownload