Request Moderation
Registered user account required
Please Login or Register to submit a moderation request.
Email Submissions
We also accept moderation reports via email. Please see the Content Moderation Policy for instructions on how to make a moderation request via email.
Targeted Individuals The six phases
Targeted Individuals The six phases
Targeted individuals are experiencing a progression of phases that include selection, surveillance, stalking, defamation, attack, and monitoring. These six phases may have some overlap; however, they are distinct enough to separate them into phases. The time spent on each phase may vary from individual to individual and is probably a reflection of the desires of the perpetrator of the experimentation.
Targeted Individuals – Phase 1: Selection
The groups perpetrating this type of experimentation are given access to the technology as covert, independent contractors of the government agencies responsible for its development. The groups given access to the technology are allowed to choose victims for any reason they deem necessary.
While a small number of victims have come forward with convincing evidence of direct harassment from various government agencies, these are mostly whistle-blowers employed by the same agencies and comprised the minority. Most victims are everyday people who would be considered “common” by most standards.
Targeted Individuals – Phase II: Surveillance
Surveillance of the chosen target closely follows selection. The surveillance phase differs from the stalking phase in that during the surveillance phase the target is unaware that it is occurring. Once selected, the target is extensively surveilled through multiple means which include background checks, credit checks, mail tampering, email hacking and direct observation, both physically and electronically. Surveillance accomplishes several important goals that are integral to the success of the remainder of the operation. It allows the perpetrator to accurately determine the target’s daily living activities. Most importantly, where they live, work, bank and how they spend their leisure time are quickly assessed. The people they spend the majority of their time with are identified and scaled in order of importance. For instance, highly valued circumferential targets would include the target’s close family members, supervisors, physicians, clergy and anyone else that they may spend substantial time communicating with. This allows the perpetrators to know with reasonable certainty who the target will confide in once they are aware of their targeting. During this phase the target’s social status is ascertained with regard to their relationships with loved ones, neighbors, co-workers, supervisors, and others. Any participation in taboo behavior such as drug use, excessive alcohol intake, domestic violence, infidelity or pornography are especially noted and followed up on very closely. All the data collected during this phase will be used to control, mislead, defame, and isolate the target. Also, during this phase the perpetrators will often have neighbors, coworkers and relatives assisting them with the surveillance. This is usually accomplished by misleading those individuals into thinking they are assisting with a legitimate law enforcement investigation.The successful application of this technique by the perpetrators will later legitimize the defamation phase and protect them from possible arrest during the stalking phase. With the neighbors believing that they are assisting with an investigation by a legitimate agency, they are more apt to believe the defamatory remarks they are told about the target. Moreover, they are less likely to call the police and report the vehicles they see parked in front of the target’s home throughout the night.
Targeted Individuals – Phase III: Stalking
Stalking of the target is a natural extension of the surveillance phase. These phases differ in that the surveillance phase is usually unknown to the target while the stalking phase is done with full awareness of the target.Organized stalking is probably the most accurate description, reflecting the highly organized and methodically planned out form of stalking that these victims experience. The methods involved are directly adapted from the COINTELPRO operations ran by the FBI in the 1950’s and 1960’s against groups seen as radical elements. The tactics include total inundation of the target at home and wherever they may go, breaking and entering of their domicile and physical harassment and intimidation. Electronic harassment is used during this phase with regard to email tampering, computer hacking, cell phone spoofing and cyber-bullying!
Targeted Individuals – Phase IV – Defamation
The stalking phase serves several important functions for the group perpetuating the operation to insure that the target is totally enveloped in the operation with minimal chance of escape. It places the victim in a victim-mind state of hopelessness, especially once the victim has been ignored by police agencies through which the victim has sought help. Stalking is very difficult for police agencies to prosecute under normal circumstances.
| Category | News & Politics |
| Sensitivity | Normal - Content that is suitable for ages 16 and over |
Playing Next
Related Videos
306
7:12
Mind control crimes explained . A must watch for everyone
1 month, 2 weeks ago
126
5:57
CIA Atrocities everyone should know about
2 months, 2 weeks ago
124
3:11
The CIA ,the world super mafia, and the COVID-19 criminals.
2 months, 3 weeks ago
Warning - This video exceeds your sensitivity preference!
To dismiss this warning and continue to watch the video please click on the button below.
Note - Autoplay has been disabled for this video.
This advertisement has been selected by the BitChute platform.
By purchasing and/or using the linked product you are helping to cover the costs of running BitChute. Without the support of the community this platform will cease to exist.
Registered users can opt-out of receiving advertising via the Interface tab on their Settings page.
To help support BitChute or find out more about our creator monetization policy:
