For several days in a row, when doing errands in your car, you consistently come in contact with drivers who tailgate you, cut you off in traffic, or maybe pull out in front of you unexpectedly. Or you go out to get your mail and see someone sitting on a bicycle watching you from a distance. Or maybe you notice a sudden increase in strange cars driving slowly pass your home. Or you get the feeling you are being followed but don’t see anyone there. Or you find garbage strewn on your lawn or piles of dirt where dirt shouldn’t be. Or you return to your home and notice that pictures or knickknacks aren’t where they were when you left.
Is this all just coincidental or is there something more to it? You might even wonder if you just have an over-active imagination or if maybe you’ve slipped a few cogs upstairs.
Over the past ten years, a phenomenon has become apparent that more recently has been given a name:—gang-stalking, also known as group-stalking, vigilante-stalking and predatory gang-stalking.
Over a period of time gang-stalking has produced some commonalities among those targeted or victimized:
1. The target is likely seen as a threat to a cause;
2. The target most likely does not know the perpetrators of the gang stalking;
3. Those involved in the gang-stalking do not know the target;
4. Those involved in the gang-stalking do not necessarily know why they are gang-stalking an individual;
5. The stalking is subtle but targeted and can be seen as inconsequential or everyday such as …
6. The gang-stalking takes place over a period of time or number of years;
7. The faces of those involved in gang-stalking change frequently but the perpetrators often remain constant.
The intent of gang-stalking is to …
1. Render the target, the victim, psychologically demoralized even to the point of committing suicide;
2. Make the target appear, to the larger community, to be mentally unstable for the purposes of … a. discrediting and psychologically demoralizing the target; b. ensuring no one will believe the target when they claim they are being targeted;
3. Alienate and marginalize the target from the larger community, even family, making it easier to psychologically demoralize and discredit the target.
The number of reported incidences of gang-stalking has increased measurably since the early 1990s when the transformation of American society to systems philosophy began in earnest.
Gang-stalking holds no political association with those targeted covering the political spectrum of liberal, centrist, conservative, ultra-left and ultra-right. People involved in gang-stalking display a common trait of needing to feel that they have power over the target even though they may not know that person.
Group dynamics, how individuals interact in a group, a general need of an individual for human contact and interaction, plays a key role in the structure of gang-stalking.
One high-ranking law enforcement official, on the condition of anonymity, has stated that …
1. Law enforcement is under strict orders that they are to ignore all cases of gang-stalking, and if possible to provide evidence that the victim is criminally insane; and
2. The criminal justice system is strictly under the control of a small elite who ensure that no charges are pressed against the instigators of gang-stalking.
Gang-stalking relies heavily on …
1. The target becoming so psychologically demoralized that he/she believes there must be something wrong with him/her and is, therefore, afraid to say anything for fear others will think them crazy;
2. The target will have no evidence beyond his/her word that the gang-stalking is happening;
3. The target will have no detailed records or documentation showing what, when, where, and to what extent;
4. The target will not be able to find out who the perpetrators are or those involved in the gang-stalking.
Anyone who believes they are being gang-stalked should …
1. Keep detailed records and documentation of times, dates, and details; making those records as soon as the incident is apparent so details are not lost over time.
2. Take pictures of any evidence left by the perpetrators making sure to include a point of reference in the picture for identification purposes. For instance, if trash is strewn on the lawn, take close ups but then take pictures showing the house, garage, or even a car in the picture as a point of reference that the garbage was actually where you claim it was.
3. Keep detailed records of any interaction with law enforcement; even when law enforcement are friendly and appear to be empathetic. Keep track of who the responding officer is, what department he works for, what he tells you, what he does. If he removes evidence from the scene, note how he handles it, what he does with it. Know the procedures for preserving evidence and observe if the officer follows those procedures. Write it all down so details aren’t lost over time. Ask for an event number and incident number.
4. If you believe you are being gang-stalked, get a psychological evaluation immediately. This establishes that you are mentally stable when those involved and law enforcement try to intone that you are somehow mentally deranged.
5. If you believe you are being gang-stalked, don’t be afraid to speak up. There was a time when people being stalked were not listened to, were considered to be off in the head. Now stalking someone is a crime. The more who speak up, the better chance there is that gang-stalking will not continue to operate under the radar.
By Lynn Stuter
Dr. Duncan talks in detail about the technology being used in no-touch torture programs. He explains more in this video than any other that I’ve seen. He claims that the technology is being developed to be used on the overall population.
By Steve DiBasio
Robert Duncan is a scientist with multiple degrees from Dartmouth College and Harvard University in Applied Sciences (e.g., artificial intelligence, pattern recognition and robotics) and Business. He has worked on projects for the CIA, Department of Defense, and Department of Justice. In 2004 he testified before the Senate Intelligence Committee, Judiciary Committee, and 23 members of Congress regarding non-consensual experimentation on American citizens.
In 2010 he authored, in partnership with an anonymous consortium of scientists calling themselves the “Mind Hacking Strategy Group,” a book entitled Project: Soul Catcher, Secrets of Cyber and Cybernetic Warfare Revealed. He has appeared on the radio show Coast To Coast and was interviewed by Jesse Ventura for the “Brain Invaders” episode of the television program Conspiracy Theory. 
I cited Duncan’s work in an article I wrote for Veterans Today and Nexus Magazine called “Mind Control In The 21st Century” (Part I and Part II). Recently I had the opportunity to speak with him.
In the interview posted below we discuss, among other topics, remote “mind reading,” CIA hive mind experimentation (multiple people sharing the same mental “space”), how people can be targeted and tracked remotely via their energy signature or “brain print,” the existence and use of a technology for remotely “cloning” or “copying” thoughts, emotions and other states (including intense pain) onto a target,  and how a weapons system capable of totalitarian control has been developed (with non-consensual and often-times brutal experimentation on civilians ongoing).
Duncan also reveals that many people are now in wireless mental contact with artificial intelligence run on supercomputers.
It is worth noting that current research projects, according to Duncan, have targeted people from all walks of life, not merely (or mainly) the “downtrodden,” as was done in the past.
Some of these targets are threatened with harm to themselves or family members if they do not carry out the instructions of their “handler,” or are promised release from their tortures if they perform some action. 
For example, Myron May, the Florida State University shooter, a former assistant district attorney, posted on Facebook before the shooting:
Has anyone been asked to kill promise of freedom
Duncan, who has interviewed many targets, has said that he immediately recognized the “torture script” used on May after listening to a recording in which May discusses his ordeal.
Perhaps most frightening is Duncan’s contention that the scalability of this technology is being tested: “…[A] lot of people won’t believe me and that’s fine. But they’re increasing this. They are scaling this technology to the entire population.
 A partial summary history of his work (classification prevents full disclosure) includes: Tank recognition from satellites, submarine signature recognition from acoustic underwater phased arrays, stock market statistical arbitrage, voice and vascular signature recognition, truth detection systems, robotic surgery in medicine, EEG controlled robots, and “brain print” recognition.
 The technology is called “EEG Cloning” or “EEG Heterodyning.” The brain patterns (electromagnetic signals) “cloned” onto the target may be catalogued brain patterns stored in computers, though live signals from a “real person’s” brain could also be transmitted to the target.
 The handler communicates with the target through a technology for transmitting voices into people’s heads which goes by many names, including “voice to skull,” synthetic telepathy,” “microwave hearing,” and the “Frey effect.” The communication may also be accomplished via EEG heterodyning, which involves “re-mapping the auditory cortex of the human brain.” Other technologies for transmitting voices include “ultrasonic heterodyning” and bone conduction techniques.
Dr. Robert Duncan’s books: Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed
How to Tame a Demon: A short practical guide to organized intimidation stalking, electronic torture, and mind control
Tyrone Dew’s book:
Illuminati Got Me! Satellite Directed Energy Weaponry Terrorism
Dr. Robert Duncan has worked for DARPA, the CIA and the Departments of Defense and Justice as an engineer on torture and surveillance technologies.
An impassioned plea to those who are or whom may become part of the torturing and killing of “targeted individuals”. Lives are on the line and blood is being spilled. This persecution program may even become part of the Biblical mark of the beast.
Although this “program” has gone full tilt since the 911 false flag event and subsequent enactment of the pre-scripted Patriot Act, I believe that it has transpired in one form or another throughout the ages. Indeed Rome, who took over the ancient Mystery Religion from Babylon, has been the purveyor of such Programs through their militant arm, the Jesuits. Also, the Freemasons and other secret societies are renown for targeting individuals for persecution and blacklisting. Whoever is participating in the torture and ruin of another has blood on their hands and will be judged by God accordingly.
Choose this day whom you will serve and what you are willing to do to either spare your life or to do what is right and just and good–no matter what the eventual price. This is about eternity and Keith’s plea lays it all on the line. God bless every person that takes a bold stand in proclaiming the truth in this wicked age.
There is a global network of secret assassins that are persecuting, torturing, and murdering targeted individuals around the world. This phenomenon is Biblical in nature and scope and is the fulfillment of prophetic Scripture. That those who did not receive a love for the truth would justly receive the delusion that God would bring upon them, even as they choose to believe a lie and take pleasure in unrighteousness. This end-time delusion where Christians and non-Christians participate in a secret persecution and silent assassination of selected individuals in society has its basis in a statement made by George W. Bush after the ’9/11 attack.’
“We will direct every resource at our disposal… every tool of intelligence, every instrument of law enforcement, every financial influence, and every necessary weapon of war to the disruption and eventual defeat of terrorism… EITHER YOU ARE WITH US, OR YOU ARE WITH THE TERRORIST… Americans…
View original post 60 more words
This is a group that T.I. Keith Kampschaefer originated to keep us from being “suicided”, “disappeared” or isolated into oblivion. As targeted individuals are consistently becoming isolated and a dying breed, it would behoove us to join such an effort in whatever level of disclosure one is comfortable with. Keith has put a lot of thought and effort into this and I truly believe that this is something that has the potential to save lives and keep targeted individuals from negative outcomes. Please take a look at the new A.C.T.I.V.E. TI website and consider participating at some level. Unity and strength in numbers is our greatest asset and weapon against the systematic destruction of our lives.
Bravo and thank you very much for bringing your great idea to fruition, Keith. May God bless and guide this effort.
A.C.T.I.V.E. TI is…
Awareness Coalition for Targeted Individuals to
‘A’ is for AWARENESS
‘C’ is for COALITION
‘T’ is for TARGETED.
‘I’ is for INDIVIDUALS
‘V’ is for VERIFY
‘E’ is for EXISTENCE
AWARENESS – To know what is going on.
COALITION – To know what is going on together.
TARGETED – To know what is being done to us.
INDIVIDUALS – To know that we as humans have a right to live.
VERIFY – To know for sure that something is true.
EXISTENCE – To know for sure that other people know we exist.
A.C.T.I.V.E. TI IS…
ACTIVE TARGETED INDIVIDUALS RISING UP IN A UNIFYING VOICE AND PROCLAIMING…
YOU CAN TAKE ME OUT WITH ALL EYES WATCHING BUT YOU’RE NOT GOING TO TAKE ME OUT WITH THE WORLD IN OBLIVION (the world unawares).
The CIA Torture Paradigm/Matrix consists of four principle parts that often overlap with applications:
- Causing Self-Inflicted Harm
- Sensory Disorientation
- Attacking Individual Fears
- Attacking Cultural Identity.
This includes what has been coined as “no touch” invisible physical torture. The primary earmark of CIA Torture Programs is causing self-inflicted harm with a variety of intended meanings. The resulting harm is systematic systemic genocide for negative eugenics.
The CIA Torture Matrix/Paradigm consists of four principle parts that often overlap with applications:
1. Causing Self-Inflicted Harm:
- The Primary Earmark of CIA Torture Programs, Mental Illness, Post Traumatic Stress Disorder [PTSD], and Suicide; etc.
2. Sensory Disorientation:
- Light, Temperature, Sound, Voice to Skull [V2K] Devices Defined By US Army as NLW that use a specific sound frequency range to transmit message through the bones of the human skull, Direct Energy Weapons, Electronic Harassment, Telephonic Harassment, Weaponized Neurological Technologies, Gunfire, Loud Noises, Horns and Sirens, Repeated Ad Nauseam Stimulus or Subliminal Messaging scientifically proven able to permanently alter the human nervous system and change the chemistry of the brain aka Mind-Control or “Brainwashing”; etc.
3. Attacking Individual Fears:
- Personal and Family Safety, Psyops Terrorism and “No touch” Invisible Physical Torture under the constant Threat of Death, Psyops, Brain Fingerprinting, COINTELPRO is an acronym for Counter Intelligence Program with ongoing operations conducting illegal fractionalizing practices since 1956 and which potentially enlisted the additional federal asset of the FBI’s InfraGard Program created in 1996. Counterintelligence Reverse Investigative Techniques, Psychological Herding, Fox and Hound Exercises [not to be confused with the subversive Anti-TI Activist myth of gangstalking or the legal definition of the stalking statute]; Harassment; Physical Assaults; Inappropriate Touching or same with recognizable False Apologies that might include a repeated frequency of occurrences while shopping or waiting in a line somewhere when an actor touches your bottom. Using Convicted Criminals released from prison to conduct deliberately visible and non-visible surveillance on former members of Law Enforcement who previously assisted in that criminal’s prosecution, to affect Political Retribution against the Targeted Individual [TI] and Government Whistleblower through COINTELPRO operations in conjuncture with the CIA Torture Matrix/Paradigm as an applied Clandestine Neutralization Campaign, which includes the prevention of gainful employment, separation from professional degrees or the completion of same while illegally disenfranchising the TI from all entitled state and federal constitutional civil liberties and inalienable human rights. The full version of the Blackfile Summary Report will include a 1994 COINTELPRO pseudo successful assassination attempt and conspiracy to commit illegal Cointelpro operations within the DEA, FBI and CIA on U.S. soil, before, during and after my employment with the FBI. Note: Gangstalking is a myth supported by Anti-TI Activist that know or should have known subverts current and previously documented historical evidence of U.S. Government culpability for ongoing COINTELPRO operations. The winning legal strategy for a restoration in the lives of targeted individuals is the reopening a 3rd Congressional COINTELPRO investigation with the appointment of a Special Independent Counsel possessing subpoena powers for obtaining classified government documents that shows a specific harm to a specific person by a specific federal agent. With this real evidence, the affected TI has laminated a winnable lawsuit that should harvest a meritorious restorative settlement.
4. Attacking Cultural Identity:
- Anti-Semitism, Racial Discrimination, Gender Preference; etc. Individually these acts might seem commonplace, but when laminated together with a constant or nearly constant frequency of cyclical re-occurrence, these applications on multiple levels recognize the ingredients that become “no touch” invisible physical torture and terrorism often produced with the constant fear of death various tactics, techniques and technologies. Medical science recognizes that repeated stimulus alters the human nervous system and can permanently change the chemical neurology of the human brain. There is no more science fiction, everything has been manufactured or is already on the drawing board.