Click to copy, then share by pasting into your messages, comments, social media posts and websites.
Click to copy, then add into your webpages so users can view and engage with this video from your site.
Report Content
We also accept reports via email. Please see the Guidelines Enforcement Process for instructions on how to make a request via email.
Thank you for submitting your report
We will investigate and take the appropriate action.
Targeted Individuals The six phases
Targeted Individuals The six phases
Targeted individuals are experiencing a progression of phases that include selection, surveillance, stalking, defamation, attack, and monitoring. These six phases may have some overlap; however, they are distinct enough to separate them into phases. The time spent on each phase may vary from individual to individual and is probably a reflection of the desires of the perpetrator of the experimentation.
Targeted Individuals – Phase 1: Selection
The groups perpetrating this type of experimentation are given access to the technology as covert, independent contractors of the government agencies responsible for its development. The groups given access to the technology are allowed to choose victims for any reason they deem necessary.
While a small number of victims have come forward with convincing evidence of direct harassment from various government agencies, these are mostly whistle-blowers employed by the same agencies and comprised the minority. Most victims are everyday people who would be considered “common” by most standards.
Targeted Individuals – Phase II: Surveillance
Surveillance of the chosen target closely follows selection. The surveillance phase differs from the stalking phase in that during the surveillance phase the target is unaware that it is occurring. Once selected, the target is extensively surveilled through multiple means which include background checks, credit checks, mail tampering, email hacking and direct observation, both physically and electronically. Surveillance accomplishes several important goals that are integral to the success of the remainder of the operation. It allows the perpetrator to accurately determine the target’s daily living activities. Most importantly, where they live, work, bank and how they spend their leisure time are quickly assessed. The people they spend the majority of their time with are identified and scaled in order of importance. For instance, highly valued circumferential targets would include the target’s close family members, supervisors, physicians, clergy and anyone else that they may spend substantial time communicating with. This allows the perpetrators to know with reasonable certainty who the target will confide in once they are aware of their targeting. During this phase the target’s social status is ascertained with regard to their relationships with loved ones, neighbors, co-workers, supervisors, and others. Any participation in taboo behavior such as drug use, excessive alcohol intake, domestic violence, infidelity or pornography are especially noted and followed up on very closely. All the data collected during this phase will be used to control, mislead, defame, and isolate the target. Also, during this phase the perpetrators will often have neighbors, coworkers and relatives assisting them with the surveillance. This is usually accomplished by misleading those individuals into thinking they are assisting with a legitimate law enforcement investigation.The successful application of this technique by the perpetrators will later legitimize the defamation phase and protect them from possible arrest during the stalking phase. With the neighbors believing that they are assisting with an investigation by a legitimate agency, they are more apt to believe the defamatory remarks they are told about the target. Moreover, they are less likely to call the police and report the vehicles they see parked in front of the target’s home throughout the night.
Targeted Individuals – Phase III: Stalking
Stalking of the target is a natural extension of the surveillance phase. These phases differ in that the surveillance phase is usually unknown to the target while the stalking phase is done with full awareness of the target.Organized stalking is probably the most accurate description, reflecting the highly organized and methodically planned out form of stalking that these victims experience. The methods involved are directly adapted from the COINTELPRO operations ran by the FBI in the 1950’s and 1960’s against groups seen as radical elements. The tactics include total inundation of the target at home and wherever they may go, breaking and entering of their domicile and physical harassment and intimidation. Electronic harassment is used during this phase with regard to email tampering, computer hacking, cell phone spoofing and cyber-bullying!
Targeted Individuals – Phase IV – Defamation
The stalking phase serves several important functions for the group perpetuating the operation to insure that the target is totally enveloped in the operation with minimal chance of escape. It places the victim in a victim-mind state of hopelessness, especially once the victim has been ignored by police agencies through which the victim has sought help. Stalking is very difficult for police agencies to prosecute under normal circumstances.
Category | News & Politics |
Sensitivity | Normal - Content that is suitable for ages 16 and over |
Playing Next
The targeted individual's genocide. why everyone should be concerned?
3 years, 7 months ago
Related Videos
1 year, 5 months ago
HOW THEY IMMOBILIZE THE VICTIM
1 year, 6 months ago
1 year, 6 months ago
Learn about mind control from Joe biden
1 year, 6 months ago
Warning - This video exceeds your sensitivity preference!
To dismiss this warning and continue to watch the video please click on the button below.
Note - Autoplay has been disabled for this video.