We have linked to much content in order to share information about the Targeting program, all information is the opinion of individuals that have shared content online. Please research this subject and form your own beliefs. Gang Stalking is a crime that is being reported across the nation by thousands of people. All reporting the same crimes being committed against them.
The Persecution of Innocent Civilians has grown dramatically since the passing of the Patriot Act and the creation of the Corrupt FISA courts. State and Local Police, FBI, Fusion Centers, NSA, DOJ, Homeland Security, Citizen Corps, Freedom Corps, Infraguard, National Neighbourhood Watch and many other intelligence agencies are involved in the targeting program that targets innocent Civilians who are never afforded the right to a trial.
The term Gang-Stalking or Organized Stalking refers to intense, long term surveillance of a civilian. There is much documentation that is available online. Links are given at the bottom of this Page.
Please register to share post, videos, and testimony about the crimes being committed against Targeted Civilians Worldwide.
If you or someone you know is experiencing this type of crime please call PACTS International at: 1-888-639-5559
If you or someone you know are witness to this type of crime please document all criminal activities witnessed and email documentation to: firstname.lastname@example.org
A look at Neural Link technology and the advances that have been made in this field in recent years. Darpa one of the leading researchers in brain mapping has joined other tech giants to to deliver this technology into the hands of the nations intelligence and law enforcement agencies that were militarized during and after the presidency of William Clinton.
The N.S.A. domestic spying operation has stirred such controversy among some national security officials in part because of the agency’s cautious culture and long-standing rules.
Widespread abuses — including eavesdropping on Vietnam War protesters and civil rights activists — by American intelligence agencies became public in the 1970’s and led to passage of the Foreign Intelligence Surveillance Act, which imposed strict limits on intelligence gathering on American soil. Among other things, the law required search warrants, approved by the secret F.I.S.A. court, for wiretaps in national security cases. The agency, deeply scarred by the scandals, adopted additional rules that all but ended domestic spying on its part.
The legal opinions that support the N.S.A. operation remain classified, but they appear to have followed private discussions among senior administration lawyers and other officials about the need to pursue aggressive strategies that once may have been seen as crossing a legal line, according to senior officials who participated in the discussions.
For example, just days after the Sept. 11, 2001, attacks on New York and the Pentagon, Mr. Yoo, the Justice Department lawyer, wrote an internal memorandum that argued that the government might use “electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies in order to intercept telephonic communications and observe the movement of persons but without obtaining warrants for such uses.”
Mr. Yoo noted that while such actions could raise constitutional issues, in the face of devastating terrorist attacks “the government may be justified in taking measures which in less troubled conditions could be seen as infringements of individual liberties.”
In the below video John Yoo touches on the legalities of live burial, and the torture of children to extract statements from suspected terrorist. This at 48:20 of the video.
The Infringements on these liberties have now became widespread in the program that Targets Innocent Civilians, and have led to the deaths of a untold number. Besides the physical torture that our intelligence agencies are now at liberty to use abroad, we see also the use of psychological torture alongside electronic warfare technology. The very same technology that has been used in the Syrian, Iraqi and Afghanistan conflicts, as well as against the US Diplomats in Cuba is used on a daily basis on Civilians worldwide.
We conclude below that the Fifth Amendment Due Process Clause is inapplicable to the conduct of interrogations of alien enemy.combatants held outside the United States for two independem reasons. First, the. Fifth Amendment Due Process Clause does not apply to the President’s conduct of a war. Second, even if the Fifth Amendment applied to the conduct of war, the Fifth Amendment does not apply extraterritorially to aliens who have no connection to the United States. We address each of these reasons in turn.John_Yoo_army_torture_memoDownload
As Attorney General Speed concluded, the Due Process Clause has no application to the conduct of a military campaign: That portion of the Constitution which declares that ‘no person shall be deprived.. . of his life,liberty, or property without due process of law,’ has such direct reference to, and connection with, trials for crime or criminal prosecutions that comment upon it would seem to be unnecessary. Trials for offences against the laws of war are not embraced or intended to be embraced in those provisions…. The argument that flings around offenders against the laws of war these guarantees of the Constitution would convict all the soldiers of our anny of murder; no prisoners could be taken and held; the anny could not move. The absurd consequences that would of necessity flow from .such an argument show that it cannot be the true construction-it cannot be what was intended by the framers of the instrument. One ofthe prime motives for the Union and a federal government was to confer the powers of war. If· any provisions of the .. Constitution are so in conflict with the power to carry on war as to destroy and make it valueless, then the instrument,instead of being agreat and wise one, is a miserable failure”a felo de se.
“After more than a year of research by the specialized agencies and experts from Cuba and the United States, it is confirmed that there is no credible hypothesis or conclusions adhered to science that justify the actions taken by the government of the United States against Cuba to the detriment of the bilateral relationship and with obvious political motivations,” the statement said.The Cuban response comes after the US withdrew two more people from the US embassy in Havana, Cuba, due to health concerns, according to a senior State Department official.The individuals in the “potentially new cases” of a mystery illness that has plagued embassy employees have undergone medical evaluations and were not yet “medically confirmed,” the official said. In the past, some officials have characterized the incidents at the embassy as “sonic attacks” or “acoustic attacks” because they have often coincided with a high-pitched sound. US officials have detailed how personnel in Cuba came to experience a variety of symptoms including sharp ear pain, headaches, ringing in one ear, vertigo, disorientation, attention issues and signs consistent with mild traumatic brain injury or concussion.
Modern warfare is waged largely on the electromagnetic spectrum. Although bombs and missiles get the headlines, they are just the kinetic step in a “kill chain” that relies heavily on electronic sensors and computers to detect, track, prioritize and target enemy assets. If the enemy is technologically advanced, it will be using its own array of electronic devices to deceive, disrupt or destroy attacking forces. These defensive measures will typically include methods for interfering with the electronic signals that smart bombs depend on for accuracy.
The struggle to control and exploit the electromagnetic spectrum makes today’s conflicts fundamentally different from those of the past. Although Sun Tzu understood 2000 years ago that success in war often depends on deception, the opportunities to confuse, disorient and demoralize adversaries have multiplied as the military enterprise came to depend so heavily on electronic tactics and tools. Electronic warfare thus is a central feature of military strategy for the foreseeable future.
This list shows 33 Medical Doctors, PhD Scientists, and former government agents that agree with our claim, that the U.S. government is using an illegal program of microwave targeting against civilians. We encourage and support all Whistleblowers to come forward with their information. Some of us are proud Whistleblowers and Political Activists, and would gladly do it again,
Dr John Hall, M.D. and author
Dr Katherine Horton, PhD Oxford Univ. Scientist
Dr Robert Middlebrook, PhD Professor
Dr Harold Mandel, M.D.
Dr Daniel Lebowitz, M.D.
Dr Max Williams, PhD, Professor & State Dept
Dr Barrie Trower, PhD government Scientist
Dr Michael Hoffer, M.D., Univ of Miami
Dr Colin Ross, M.D.
Dr Ed Spencer, M.D.
Dr Sue Arrigo, M.D.
Dr Douglas Smith, M.D., Univ of Penn.
Dr Terry Robertson, M.D.
Dr Robert Duncan, PhD former CIA engineer
Dr Doug Rokke, PhD government Scientist
Dr Eric Karlstrom, PhD Professor
Dr Nick Begich, Scientist
Dr Paul Batcho, PhD government scientist
Dr Paul Marko, PhD Psychologist
Dr Robert Steele, former CIA analyst
Dr Ben Colodzin, PhD Psychologist
Dr Curtis Bennett, Professor
Dr Corkin Cherubini, author
Dr Sean Andrews, Scientist
Willam Binney, NSA Whistleblower
Kirk Weibe, NSA Whistleblower
Karen Stewart, NSA Whistleblower
Carl Clark, CIA Whistleblower
Kevin Shipp, CIA Whistleblower
Mark Phillips, CIA Whistleblower
John DeCamp, Army intelligence Whistleblower
30 Free ebooks for TI’s by Richard Lighthouse.
Right-click and Save-As. You can download and read each one on your phone or computer.
Or see RLighthouse.com to find more.
His ebooks for TI’s are always free. //www.rlighthouse.com/store.html
|the-governors-of-gangstalking.pdfDownload File||satellites_weapons-of-the-af-space-command-1d.pdfDownload File||treason-at-the-air-force-space-command.pdfDownload File|
|10reasons-prove-watchlist-fraud-1c.pdfDownload File||scalar-weapons-targeted-individuals.pdfDownload File||targeted-individuals-how-to-fight-back.pdfDownload File|
|advice-about-gangstalking-targeted-individuals.pdfDownload File||the-microwave-torture-of-ed-snowden-julian-assange.pdfDownload File||massive-fraud-at-att.pdfDownload File|
|targeted-individuals-standard-nomination-form.pdfDownload File||manipulation-of-secondary-personalities.pdfDownload File||ebook-template.docDownload File|
|listen-to-microwave-bullets-from-cell-towers.pdfDownload File||preliminary-statistics-for-targeted-individuals.pdfDownload File||ten-most-wanted-deep-state-criminals.pdfDownload File|
|how-to-disable-satellite-weapons.pdfDownload File||us-violations-1967-outer-space-treaty.pdfDownload File||more-officers-at-air-force-space-command.pdfDownload File|
|estimated-numbers-of-targeted-individuals.pdfDownload File||psychiatric-fraud.pdfDownload File||cell-towers-and-targeted-individuals.pdfDownload File|
|abolish-the-federal-reserve.pdfDownload File||government-criminals-adobe-voco.pdfDownload File||i-will-only-react-to-constructive-suggestions.pdfDownload File|
|rockefeller-rothschild-stock-data-2016-fraud.pdfDownload File||treason-at-the-cia.pdfDownload File||34-patents-on-subliminal-mind-control.pdfDownload File|
|targeted-individuals-technical-information.pdfDownload File||rockefeller-rothschild-dirty-money-london-stock-exchange.pdfDownload File||cell-phone-hacking-the-nazi-stasi-academy-nsa.pdfDownload File|
|underground-portals-of-usaf-cia-1d.pdfDownload File||top-50-websites-targeted-individuals-2a.pdfDownload File||houston-gangstalking-boss-1c.pdfDownload File|