THEY TARGET ME SO I TARGET THEM
THIS IS WHY I AM SO CAREFUL
Hi all you who know me personally and those who donâ€™t know me who I communicate to,
One more thing, for those of you who want to know why I do not identify myself online or give out any personal data, hereâ€™s why. I am a stalking victim. I was one of the women chosen for whatever reason by those using Directed Energy Weaponry etc. It started before I got into the Kennedy research and became obvious after I started the research. The â€œShadow Governmentâ€ has stolen technology developed by the military to spy on people. Their targets are usually single woman with out a support system. It starts with phone tapping and then all of a sudden your mail doesnâ€™t reach its destination or reach you. Your Emails are not sent either and you are followed. Your computers are plagued with one virus after another, which is one of the main reasons I went to a Mac.
It becomes obvious when they plant their white vans next to your home or in front of your home that they do surveillance with. When I finally asked the guy what he was doing next to my home every day, the driver of the white van told me he was watching my neighbor. The van did not return the next day but instead a white car sat there in the same spot. When we ran the license plate on the van, the address associated with it went to a Post Office Box. Police were always around me, my cousin and my girlfriend, everywhere we went after I begin my research into my possible bloodline connection to the Kennedyâ€™s and the subsequent research I have been doing for my book. If I talked on the phone to tell someone where I was going, something would happen to me when I reached my destination, which confirmed the fact that I was being monitored by phone and may be even by a mobile chip placed on my car. Example: After we knew our phone was being tapped I would deliberately say things on the telephone to prove my point. One Halloween I called my girlfriend and told her the exact spot we were going to take the kids trick or treating She told me she would pick me right up. She lived in the same town home complex I owned my home in. After we reached our destination, which was only 5 minutes away, I opened the door to the car and stepped on the curb. At that very same moment the lights in the
My girlfriend was also being monitored so she became frightened and panicked as she usually did when the helicopter flew over us as we drove away from the blacked out area. I just told her to go to a different spot and we were fine. After that no black outs occurred in the spots we chose to trick or treat in. When I called the power company the next day they had no record of a power outage in this 4- 6 square block area.
My girlfriend was also involved in the Kennedy research with me. She would come home to find her furniture moved, lights on that she had turned off. Sometimes her door was unlocked.. Items from her living room (knick knacks) would be in her refrigeration. She had an ongoing sound in her kitchen that resembled what would happen if someone were setting off fire works in her kitchen that would trickle down the center of counters. It was not loud but was obvious. She would unlocked her car door time after time to find food wrappers in it, or items that were not hers. She would also find a face card like the Queen of Harts, Jack of Spades etc., laying face on her car seat. She would go to the bus stop and find the same face card punched into the grass in front of the bench. She would see what looked like computer chips (holographic images) in the fresh snow, which makes me think she may have been chip, implanted. Today they donâ€™t even need to use chip implants, if you have an implant they can simply send an image into your brains receiving system. I didnâ€™t see the microchip image in the snow myself but what I did notice what that she saw these images in fresh snow that had not been stepped in or compromised in anyway. After she had enough she went to the police asking for help wanting to be placed in a safe house until they could find out who was doing these things to her. After they refused to help her, she left the police station she went to her bank to withdraw money form her ATM machine so she could stay in a motel for the night. Unfortunalty she told the police that this is what she was going to do, so after she withdrew the money she found herself surrounded by a police van and 4 squad cars that put her into a 72 hour hold instead of helping her. She was never able to work from that point on and she used to work 2 jobs to support herself and her son. People under surveillance learn quickly not to trust the police.
My cousin who was also doing the Kennedy research was being harassed for a very long time. She was finally taken to the hospital where they found out she was being poisoned. She used to comment on helicopters flying
overhead when she and her family were out. An unknown driver of a car on â€œBryantâ€ street in another state, hit she and her husband when she was doing the Kennedy research, and as you know now, my last name is Bryant. She continued to be monitored and bothered today and her health deteriorates.
I was the tough one. Many things happened to me over and over again but instead of panicking I got mad and dug in my heals, determined to find out who was doing this to us. Not long after my dear dear friend and my cousin who may have known something about the Kennedy family connection died, in an unusual way, I lost the new home we had just built in a foreclosure scam. Now I am only giving you highlights here but the stalking went on for years and is still happening to me. I know this because they accidentally flicked their microphone on or open one day and I could hear the operator sneeze and clear his throat right in front of my closet door in the living room. My daughter and granddaughter heard it to. I was clear as a bell. The closet door was open and the time and when it happened my daughter had an shocked expression on her face and said â€œMaybe you should shut the closet door.â€ This is life for people who are under survelience.
Once the BAG GUYS got a hold of the Directed Energy technology they began finding people they could practice on like Guinea Pigs. They would pick woman primarily in their child bearing age or older generally. They would come into their homes at night and do things while their targets were sleeping. Some of these retired or fired CIA or FBI agents they hire to do surveillance on their targets are rapping some of them. My neighbor who is going blind swears they change the lenses in her glasses so that she has a harder time seeing. She hears audible voices all of the time and she thinks she knows who they are. It started for her when she worked for the Post Office. These nasty guys often find people in Government Buildings because they work for the Shadow Government. She said that one day she was sitting
at her station doing her job and all of a sudden she heard audible voices in her head telling her to do something. She said she looked up at the catwalk and looked right at the person whose voice she heard in her head. From that point on they started to follow her. In the past they had to chip implant people but now with the technology they have they can just send voices into their heads. She and I still deliberately direct our comments to the voices she hears warning them that WEâ€™VE GOT THEIR NUMBER and that theyâ€™re playing with fire. I DONâ€™T HEAR AUDIBLE VOICES but once you start talking to people who are victims you will find that this is happening to a lot of people.
Here is Roger Tolces (2009) who is talking about this type of surveillance system that is being used against the general public. Heâ€™s been on
The BAD GUYS who do this also pay neighbors to spy on you, which happened to me. Here is a video of a guy who is also being monitored by Directed Energy Weaponry. He is trying to determine where the monitoring is coming from: http://www.youtube.com/watch?v=8gpPHVHih5E
Here is a single truck driver in Fort Worth Texas, who was selected by the BAD GUYS for electronic surveillance. Itâ€™s been going in Fort Worth Texas for 45 years. He does not appear to be very credible so if he should start to talk about
what is happening to him, most people would think he was on drugs etc., so he is a good example of some of the kinds of people they select to practice this technology on. He may be another GUINEA PIG archetype that no one would listen to because he does not sound very credible, which makes him a perfect candidate for them: http://www.youtube.com/watch?v=UnPg_GqD_2o&NR=1&fe ature=endscreen
This is so pervasive and is happening to so many people today that there is a bill in front of congress to make it illegal. Here is an example of the media asking when and where these weapons can be used and against whom. I think this was taped before people realized that this had been happening to ordinary people for decades; http://www.youtube.com/watch?NR=1&v=hfQoyR0up0g&fe ature=endscreen
Since I switched to the Mac I have not had a virus at least not that I know of where when I had my P.C.â€™s I had one virus after another. Larry often came over to download a whole new system for me. He had to whip my computer clean and then load in a new system.
WHAT I WRITE ABOUT GUYS IS MY WAY OF FIGHTING BACK. IT IS MY MAIN MISSION IN LIFE TO GO AFTER THE BAD GUYS. I EXPOSE WHO THEY ARE AND WHERE THEY CAME FROM. JESUS (YASHUA) FOUGHT AGAINST THEM WHEN HE WAS IN THE PHYSICAL BODY. EXAMPLE: THEY WERE THE MONEY CHANGERS IN HERODS TEMPLE, BEHIND THE CRUCIFIXION, HAD INFULTRATED THE MIDDLE EAST, ROME AND NOW RUN THE WORLD FROM THE UNITED STATES OF AMERIC OUT OF NEW YORK CITY (WORLD TRADE TOWER) AND WASHINGTON D.C. WHICH IS THE NEW CITY OR MYSTERY BABYLON IN BIBLE PROPHESY.
Below is one of many interesting links on the subject: http://www.bugsweeps.com/info/electronic_harassment.html
A.G.L. Buyers Beware
lectronic Security Co. performs Electronic Sweeping and Surveys, using the best possible Technical Surveillance Counter Measures (TSCM), to determi onically harassed. We then proscribe the proper course of action to eliminate the electronic harassment threat.
uses any electronic device to aid them in invading your person or property for the purpose of gathering information illegally, or for the purpose s Electronic Harassment.
assment comes in many forms and types. We'll try to explain what they are and what to do about them below.
ectronic Surveillance is the imposed observation of a person's belongings, person or surroundings through the use of electronic l vices, video recording or transmitting devices, spectral imaging through heat or infrared, sound or other radiation sources, and a ans of observing a person's actions, possessions or routines. Not all forms of surveillance use electronic devices and not all for veillance are illegal or considered harassment. Simply observing someone using ones eyes is certainly also considered surveilla not illegal in and of itself. Surveillance has become quite advanced and will become more pervasive as our society progresses in hnology. Micro recorders, covert hidden video cameras (such as pinhole cameras), ultra tiny microphones, micro transmitters, a gging devices are easy to get by anyone at spy novelty shops and online stores. For more on this subject, see Eavesdropping Thr vert hidden camera pictures with additional information, and Electronic Surveillance page.
ectronic Sabotage/Interference (Jamming)
ectronic sabotage or interference is any sabotage that is intentionally configuring personal property to either be destroyed or mal y intentional interference such as electronic noise generators, sound generators, light generators, spark gap disrupters, or any ot EMI (electromagnetic interference) which either destroys, disrupts, causes malfunction or loss of resources is deemed to be elec rassment.
rected Harmful High Energy Devices
is is the most dangerous form of electronic harassment and is quite easy to implement against a person. Directed harmful high e crowave devices and weapons can include such devices and equipment that are easily available almost anywhere in the World w re are people. Microwave ovens can be modified to focus and direct up to 1200 watts or more, depending on the model, of micr ergy at a person or property and are easy to produce. The results of an attack by a high energy device can be lethal, they can kill st disable a human being or other animals. Attacks from high energy microwave weapons leave blisters, cause internal bruising eding, stimulate cancer, cause cataracts, encourage tumors to grow, generate boils, or leave
patches on the skin. Directed Harmful High Energy Weapons will have effective ranges m the point of contact to several hundred yards. Directed Harmful High Energy Weapons n be used to destroy electronic devices and cause severe interference in computers and rm systems which can allow forced entry or destruction of vital data. Radar guns are
ailable from surplus stores most anywhere and can be obtained from
unted long range high power models. These devices have very long ranges due to their ater power, higher frequencies and shorter wavelength. Radar guns emit long or short lses of high energy capable of causing instant damage or death to living creatures. miconductor destruction or malfunction, brain damage & stopping vehicles are other uses
these devices. Other forms of directed harmful high energy include devices such as tasers, klystron guns (radar guns), ion beam sma pulse guns, soliton bombs, and many more devices.
rectional Microwave EMP Rifle (PARTIAL KIT) Partial kit (shown above). This partial kit will include a 50,000W (yes it says att
rected energy weapon for "Active Denial" is now being deployed by the military. ice/Data/Image induction
is form of electronic harassment causes an individual to think they are loosing their mind or that they have a mental illness. The own methods of imposing VDI induction.
t perform similar functions. A microwave carrier
ephone transmission sites so that they cannot be identified easily. See p://www.bugsweeps.com/info/elec_harass/Stealth for some examples of the way cell antennas can be hidden in in sight.
rect Contact Induction Method. This method requires direct skin contact of the subject. Voice/Data/Image
uction (VDI) is induced through the skin, using the natural ability of the skin to conduct energy. The DCI method uses a simple ltage D.C. carrier, which is modulated with the VDI signal and is coupled to the subject body using capacitive skin pads. The co ed to contact any part of the skin anywhere on the body. The signal is received and interpreted by the nerves below the skin surf t to the brain which processes the information signals, causing the images or sounds or data to appear to the target without the a their eyes or ears. A similar device is also known as the neurophone. There are many patents for similar devices. Evidence of authorized use on someone is two or more circular red marks on the skin or two or more blisters.
agnetic Pulse Induction Method. The neurons within the nerves and human brain are very sensitive to magnetic fields. The M es an induction coil to induce a low to medium magnetic field in and around the brain causing the neurons to misroute, slow do ert. This form of electronic VDI harassment is often diagnosed as EMI (electromagnetic interference) sensitivity, which is simi meone getting headaches from prolonged usage of cellular phones or nausea from being around power lines for extended period agnetic Pulse Induction Method may be employed by using a device implanted within the targets home or surroundings and can erated remotely.
diation is a very common form of harassment. A potential harasser can easily buy an old
plants are without a doubt the most invasive form of harassment. Electronic implants nsist of transmitters, ESF generators,
Newest version of a biochip implant. For more information about this chip go to
lions may be carrying microchips in their bodies worldwide. The Safe Medical Devices Act, which became a law in 1990, requires USA manufacturers o medical devices, to adopt a method for identifying and tracking their products permanently implanted in humans, and to keep track of the recipients, in lfunctions arise. Breast implants, pacemakers, replacement heart valves and prosthetic devices implanted in millions worldwide are all to be tracked. And thods used to track these devices is implanting microchips which store data about the manufacturer, the surgeon, the date of implant, etc.
ser Harassment Devices
e use of simple, easy to procure lasers to harass or "Dazzle" a subject is becoming more prevalent. Subjects of this type of haras ve reported seeing "little red dots" on their curtains, through their windows or on themselves. There have been numerous reports ople being momentarily blinded by red lights (red lasers) while they were driving in their cars. Some of these incidents have res ffic accidents, although no permanent blindness has yet to be reported as a result of being "spotted".
Laser gun sight, zoom rifle scope,
s Patent 5,629,678
al. May 13, 1997
acking and recovery system
or tracking and recovering humans utilizes an implantable transceiver incorporating a power supply and actuation system allowing the unit to remain imp r years without maintenance. The implanted transmitter may be remotely actuated, or actuated by the implantee. Power for the
omplete Patent Information
gram of the planetary coverage of the Iridum system. This system has transmit and receive coverage of the entire planet. Each circle is a coverage sector.
ere are many other forms of electronic harassment not mentioned here, but the most common forms of electronic harassment that you may likely encount d. Please read Microwave Detection - Remote Mind Control Technology for more on this subject.
oms of Electronic Radiation Exposure
may include but are not limited to: Headache, eye irritation, dizziness, nausea, skin rash, facial swelling, weakness, fatigue, pain in joints and/or muscles, ing in ears, skin numbness, abdominal pressure and pain, breathing difficulty, irregular heartbeat, sexual stimulation and hearing voices (see Patent #4,8 ymptoms have been reported in some individuals such as paralysis, balance problems, body and/or muscle spasms, convulsions, confusion,depression, di g, seizure, sleep disturbances, and memory difficulties.
Can Be Done To Protect Against Electronic Harassment?
nse, there isn't too much that can be done. You could change your venue, relocate or move to avoid the harasser but this isn't usually a practical method f
the best thing to do is give us a call from a secure phone. We will conduct a sweep of the suspect areas to locate the source of the suspected harassment a urse of action to stop the harassment.
acles are cheap and effective in blocking most
gnals with Passive or Active shielding can be an effective measure.
t is general to an area and not specifically directed to you, simply moving to another location is the easiest method to stop the harassment. If the harassm ou, then you'll need to employ some sort of shield or cover, such as mountains or a cave. Shielding may be your only alternative to stop the harassment if ral obstacles or shields. Passive shielding is less expensive then Active shielding and consists of special metal materials designed to block high frequenc ys, etc. Active shielding uses sophisticated electronic equipment to jam, capture, redirect, distort or nullify the harmful energy.
for a private individual, a company or a corporation to use electronic harassment on you. The military and law enforcement, however, can use
ing of electronic equipment; discovering unauthorized electronic surveillance; training of intelligence personnel by officers the United States is allowed.
ding any other provision of this subchapter, officers, employees, or agents of the United States are authorized in the normal course of their official duties rveillance not targeted against the communications of any particular person or persons, under procedures approved by the Attorney General.
lectronic Security Co. is an experienced and knowledgeable professional private investigative agency with the ability to find and then help you to elimina arassment. Advanced Electronic Security Co. is also a specialist in electronic surveillance and
Over 30 years of specialized service over 2,500 locations swept.
PLEASE DO NOT CONTACT US
FROM A SUSPECT TELEPHONE OR FACILITY WHEN INQUIRING ABOUT BUG SWEEPING OR OUR SERVICES AND SURVEYS.
Select show from list below to play, click on green arrow.