Share PDF

Search documents:
  Report this document  
    Download as PDF   
      Share on Facebook



Hi all you who know me personally and those who don’t know me who I communicate to,

One more thing, for those of you who want to know why I do not identify myself online or give out any personal data, here’s why. I am a stalking victim. I was one of the women chosen for whatever reason by those using Directed Energy Weaponry etc. It started before I got into the Kennedy research and became obvious after I started the research. The “Shadow Government” has stolen technology developed by the military to spy on people. Their targets are usually single woman with out a support system. It starts with phone tapping and then all of a sudden your mail doesn’t reach its destination or reach you. Your Emails are not sent either and you are followed. Your computers are plagued with one virus after another, which is one of the main reasons I went to a Mac.

It becomes obvious when they plant their white vans next to your home or in front of your home that they do surveillance with. When I finally asked the guy what he was doing next to my home every day, the driver of the white van told me he was watching my neighbor. The van did not return the next day but instead a white car sat there in the same spot. When we ran the license plate on the van, the address associated with it went to a Post Office Box. Police were always around me, my cousin and my girlfriend, everywhere we went after I begin my research into my possible bloodline connection to the Kennedy’s and the subsequent research I have been doing for my book. If I talked on the phone to tell someone where I was going, something would happen to me when I reached my destination, which confirmed the fact that I was being monitored by phone and may be even by a mobile chip placed on my car. Example: After we knew our phone was being tapped I would deliberately say things on the telephone to prove my point. One Halloween I called my girlfriend and told her the exact spot we were going to take the kids trick or treating She told me she would pick me right up. She lived in the same town home complex I owned my home in. After we reached our destination, which was only 5 minutes away, I opened the door to the car and stepped on the curb. At that very same moment the lights in the 4-6 square bloc area we were going to trick or treat in went out. The black out was only in the area we were trick or treating in.

My girlfriend was also being monitored so she became frightened and panicked as she usually did when the helicopter flew over us as we drove away from the blacked out area. I just told her to go to a different spot and we were fine. After that no black outs occurred in the spots we chose to trick or treat in. When I called the power company the next day they had no record of a power outage in this 4- 6 square block area.

My girlfriend was also involved in the Kennedy research with me. She would come home to find her furniture moved, lights on that she had turned off. Sometimes her door was unlocked.. Items from her living room (knick knacks) would be in her refrigeration. She had an ongoing sound in her kitchen that resembled what would happen if someone were setting off fire works in her kitchen that would trickle down the center of counters. It was not loud but was obvious. She would unlocked her car door time after time to find food wrappers in it, or items that were not hers. She would also find a face card like the Queen of Harts, Jack of Spades etc., laying face on her car seat. She would go to the bus stop and find the same face card punched into the grass in front of the bench. She would see what looked like computer chips (holographic images) in the fresh snow, which makes me think she may have been chip, implanted. Today they don’t even need to use chip implants, if you have an implant they can simply send an image into your brains receiving system. I didn’t see the microchip image in the snow myself but what I did notice what that she saw these images in fresh snow that had not been stepped in or compromised in anyway. After she had enough she went to the police asking for help wanting to be placed in a safe house until they could find out who was doing these things to her. After they refused to help her, she left the police station she went to her bank to withdraw money form her ATM machine so she could stay in a motel for the night. Unfortunalty she told the police that this is what she was going to do, so after she withdrew the money she found herself surrounded by a police van and 4 squad cars that put her into a 72 hour hold instead of helping her. She was never able to work from that point on and she used to work 2 jobs to support herself and her son. People under surveillance learn quickly not to trust the police.

My cousin who was also doing the Kennedy research was being harassed for a very long time. She was finally taken to the hospital where they found out she was being poisoned. She used to comment on helicopters flying

overhead when she and her family were out. An unknown driver of a car on “Bryant” street in another state, hit she and her husband when she was doing the Kennedy research, and as you know now, my last name is Bryant. She continued to be monitored and bothered today and her health deteriorates.

I was the tough one. Many things happened to me over and over again but instead of panicking I got mad and dug in my heals, determined to find out who was doing this to us. Not long after my dear dear friend and my cousin who may have known something about the Kennedy family connection died, in an unusual way, I lost the new home we had just built in a foreclosure scam. Now I am only giving you highlights here but the stalking went on for years and is still happening to me. I know this because they accidentally flicked their microphone on or open one day and I could hear the operator sneeze and clear his throat right in front of my closet door in the living room. My daughter and granddaughter heard it to. I was clear as a bell. The closet door was open and the time and when it happened my daughter had an shocked expression on her face and said “Maybe you should shut the closet door.” This is life for people who are under survelience.

Once the BAG GUYS got a hold of the Directed Energy technology they began finding people they could practice on like Guinea Pigs. They would pick woman primarily in their child bearing age or older generally. They would come into their homes at night and do things while their targets were sleeping. Some of these retired or fired CIA or FBI agents they hire to do surveillance on their targets are rapping some of them. My neighbor who is going blind swears they change the lenses in her glasses so that she has a harder time seeing. She hears audible voices all of the time and she thinks she knows who they are. It started for her when she worked for the Post Office. These nasty guys often find people in Government Buildings because they work for the Shadow Government. She said that one day she was sitting

at her station doing her job and all of a sudden she heard audible voices in her head telling her to do something. She said she looked up at the catwalk and looked right at the person whose voice she heard in her head. From that point on they started to follow her. In the past they had to chip implant people but now with the technology they have they can just send voices into their heads. She and I still deliberately direct our comments to the voices she hears warning them that WE’VE GOT THEIR NUMBER and that they’re playing with fire. I DON’T HEAR AUDIBLE VOICES but once you start talking to people who are victims you will find that this is happening to a lot of people.

Here is Roger Tolces (2009) who is talking about this type of surveillance system that is being used against the general public. He’s been on Coast-to-Coast A.M. He was told not to talk about Bush personally on his show. The Bush’s are so down and dirty that you don’t want to know what that family had done to the Public not to mention their involvement in the assassination of President John Kennedy, Bobby Kennedy, and Martin Luther King etc. George Bush senior was the head of the CIA and both Bush’s were tapped into the Skull and Bones organization at Yale. George Bush Jr. has destroyed our rights and freedoms with the Freedom of Information Act and Patriot Act 1-2. ndscreen&NR=1

The BAD GUYS who do this also pay neighbors to spy on you, which happened to me. Here is a video of a guy who is also being monitored by Directed Energy Weaponry. He is trying to determine where the monitoring is coming from:

Here is a single truck driver in Fort Worth Texas, who was selected by the BAD GUYS for electronic surveillance. It’s been going in Fort Worth Texas for 45 years. He does not appear to be very credible so if he should start to talk about

what is happening to him, most people would think he was on drugs etc., so he is a good example of some of the kinds of people they select to practice this technology on. He may be another GUINEA PIG archetype that no one would listen to because he does not sound very credible, which makes him a perfect candidate for them: ature=endscreen

This is so pervasive and is happening to so many people today that there is a bill in front of congress to make it illegal. Here is an example of the media asking when and where these weapons can be used and against whom. I think this was taped before people realized that this had been happening to ordinary people for decades; ature=endscreen

Since I switched to the Mac I have not had a virus at least not that I know of where when I had my P.C.’s I had one virus after another. Larry often came over to download a whole new system for me. He had to whip my computer clean and then load in a new system.


Below is one of many interesting links on the subject:

A.G.L. Buyers Beware

Electronic Harassment

lectronic Security Co. performs Electronic Sweeping and Surveys, using the best possible Technical Surveillance Counter Measures (TSCM), to determi onically harassed. We then proscribe the proper course of action to eliminate the electronic harassment threat.

lectronic Harassment?

uses any electronic device to aid them in invading your person or property for the purpose of gathering information illegally, or for the purpose s Electronic Harassment.

assment comes in many forms and types. We'll try to explain what they are and what to do about them below.

ectronic Surveillance

ectronic Surveillance is the imposed observation of a person's belongings, person or surroundings through the use of electronic l vices, video recording or transmitting devices, spectral imaging through heat or infrared, sound or other radiation sources, and a ans of observing a person's actions, possessions or routines. Not all forms of surveillance use electronic devices and not all for veillance are illegal or considered harassment. Simply observing someone using ones eyes is certainly also considered surveilla not illegal in and of itself. Surveillance has become quite advanced and will become more pervasive as our society progresses in hnology. Micro recorders, covert hidden video cameras (such as pinhole cameras), ultra tiny microphones, micro transmitters, a gging devices are easy to get by anyone at spy novelty shops and online stores. For more on this subject, see Eavesdropping Thr vert hidden camera pictures with additional information, and Electronic Surveillance page.

ectronic Sabotage/Interference (Jamming)

ectronic sabotage or interference is any sabotage that is intentionally configuring personal property to either be destroyed or mal y intentional interference such as electronic noise generators, sound generators, light generators, spark gap disrupters, or any ot EMI (electromagnetic interference) which either destroys, disrupts, causes malfunction or loss of resources is deemed to be elec rassment.

rected Harmful High Energy Devices

is is the most dangerous form of electronic harassment and is quite easy to implement against a person. Directed harmful high e crowave devices and weapons can include such devices and equipment that are easily available almost anywhere in the World w re are people. Microwave ovens can be modified to focus and direct up to 1200 watts or more, depending on the model, of micr ergy at a person or property and are easy to produce. The results of an attack by a high energy device can be lethal, they can kill st disable a human being or other animals. Attacks from high energy microwave weapons leave blisters, cause internal bruising eding, stimulate cancer, cause cataracts, encourage tumors to grow, generate boils, or leave

patches on the skin. Directed Harmful High Energy Weapons will have effective ranges m the point of contact to several hundred yards. Directed Harmful High Energy Weapons n be used to destroy electronic devices and cause severe interference in computers and rm systems which can allow forced entry or destruction of vital data. Radar guns are

ailable from surplus stores most anywhere and can be obtained from ex-military sources or en police departments. Radar gun power outputs range from a two or three watts to 3 egawatts! Portable radar guns range in size from small hand held devices to vehicle

unted long range high power models. These devices have very long ranges due to their ater power, higher frequencies and shorter wavelength. Radar guns emit long or short lses of high energy capable of causing instant damage or death to living creatures. miconductor destruction or malfunction, brain damage & stopping vehicles are other uses

these devices. Other forms of directed harmful high energy include devices such as tasers, klystron guns (radar guns), ion beam sma pulse guns, soliton bombs, and many more devices.

rectional Microwave EMP Rifle (PARTIAL KIT) Partial kit (shown above). This partial kit will include a 50,000W (yes it says att X-band military microwave magnetron with complete spec sheets from two manufacturers and operational information to ma rk (about 30 pages), EMP rifle plans (over 49 pages), and qty:3 (12KV @ 1A) rectifiers. A device such as this can be made the per soaker water gun, it operates at 9.2GHz and with a properly tuned horn antenna will have an effective range of over 300 yar ssibly more with larger antenna). Such a device could possibly cause semiconductors to burn out, microprocessors to malfuncti uctors to counter induce and create CEMF, induce RF noise, cause ionization of air or gases, cause junction rectification and er mputer data on hard drives, disk and solid state device. Operating such a device may be in violation of State or Federal Laws, co ur Local authority before operating such a device. UPS GROUND SHIPPING ONLY DUE TO INTENSE MAGNETIC FIELD AGNETRON. Do not purchase this kit if it is illegal to own or operate in your area. (This kit is real and available on the internet ove photo and description was taken directly from an internet website, but we will not tell you where to find it!)

rected energy weapon for "Active Denial" is now being deployed by the military. ice/Data/Image induction

is form of electronic harassment causes an individual to think they are loosing their mind or that they have a mental illness. The own methods of imposing VDI induction.

crowave Carrier ULF-UHF Induction Method. This method utilizes a modulated microwave signal with her an audio, video, or other form of signal or even data may be used. The microwave energy with the VDI oice/Data/Image) carrier signal is then directed to the target area or individual. The reaction to this modulated crowave energy from one individual to another will usually be slightly different making it very difficult to gnose as electronic harassment. The Voice/Data/Image induction form of harassment causes victims to hear ices in their heads or see random images or lights. Similar technology was developed to enable communication ween humans and dolphins or even was purported to be used by secret agencies for the purposes of mind ding and control. A device known as the wireless neurophone has been patented along with other such devices

t perform similar functions. A microwave carrier ULF-UHF induction device can be placed at a targets location d operated and monitored remotely. Transmission locations can be concealed in the same ways that cell

ephone transmission sites so that they cannot be identified easily. See p:// for some examples of the way cell antennas can be hidden in in sight.

rect Contact Induction Method. This method requires direct skin contact of the subject. Voice/Data/Image

uction (VDI) is induced through the skin, using the natural ability of the skin to conduct energy. The DCI method uses a simple ltage D.C. carrier, which is modulated with the VDI signal and is coupled to the subject body using capacitive skin pads. The co ed to contact any part of the skin anywhere on the body. The signal is received and interpreted by the nerves below the skin surf t to the brain which processes the information signals, causing the images or sounds or data to appear to the target without the a their eyes or ears. A similar device is also known as the neurophone. There are many patents for similar devices. Evidence of authorized use on someone is two or more circular red marks on the skin or two or more blisters.

agnetic Pulse Induction Method. The neurons within the nerves and human brain are very sensitive to magnetic fields. The M es an induction coil to induce a low to medium magnetic field in and around the brain causing the neurons to misroute, slow do ert. This form of electronic VDI harassment is often diagnosed as EMI (electromagnetic interference) sensitivity, which is simi meone getting headaches from prolonged usage of cellular phones or nausea from being around power lines for extended period agnetic Pulse Induction Method may be employed by using a device implanted within the targets home or surroundings and can erated remotely.


diation is a very common form of harassment. A potential harasser can easily buy an old x-ray gun from a surplus dealer and w ght modifications use it to bombard a target with deadly amounts of x-ray radiation. Radiation devices can be battery powered a long periods of time. High exposure to x-ray radiation will cause tumors, brain disorders, mental illness, tremors, headaches, c zures or even death. Radiation harassment is usually done over long periods of time, ranging from days to years, in order to ind diation harassers can also get various radioactive materials such as thorium nitrate, plutonium oxide, uranium nitrate, and urany ing radioactive materials a harasser can cause a terrible and agonizing death.


plants are without a doubt the most invasive form of harassment. Electronic implants nsist of transmitters, ESF generators, micro-neurophonic transceivers, tracking devices d other micro sized devices designed to cause harassment by tracking or controlling vement and thought. The most common implant was designed many years ago and is l used to this day. It consists of a unit that is powered by bodily fluids and is capable of nsmitting voice signals, high voltage pulses, emitting a small tracking beacon signal, or er unspecified uses (mind control).

Newest version of a biochip implant. For more information about this chip go to

lions may be carrying microchips in their bodies worldwide. The Safe Medical Devices Act, which became a law in 1990, requires USA manufacturers o medical devices, to adopt a method for identifying and tracking their products permanently implanted in humans, and to keep track of the recipients, in lfunctions arise. Breast implants, pacemakers, replacement heart valves and prosthetic devices implanted in millions worldwide are all to be tracked. And thods used to track these devices is implanting microchips which store data about the manufacturer, the surgeon, the date of implant, etc.

ser Harassment Devices

e use of simple, easy to procure lasers to harass or "Dazzle" a subject is becoming more prevalent. Subjects of this type of haras ve reported seeing "little red dots" on their curtains, through their windows or on themselves. There have been numerous reports ople being momentarily blinded by red lights (red lasers) while they were driving in their cars. Some of these incidents have res ffic accidents, although no permanent blindness has yet to be reported as a result of being "spotted".

Laser gun sight, zoom rifle scope, 3-axis adjustable tripod head The parts that make this device can be purchased at any gun store and the tripod is a standard issue camera tripod.

Hand-held unit with laser gun sight and golf scope

s Patent 5,629,678

al. May 13, 1997

acking and recovery system

or tracking and recovering humans utilizes an implantable transceiver incorporating a power supply and actuation system allowing the unit to remain imp r years without maintenance. The implanted transmitter may be remotely actuated, or actuated by the implantee. Power for the remote-activated receiver ectromechanically through the movement of body muscle. The device is small enough to be implanted in a child, facilitating use as a safeguard against ki nsmission range which also makes it suitable for wilderness sporting activities. A novel biological monitoring feature allows the device to be used to fac ical dispatch in the event of heart attack or similar medical emergency. A novel sensation-feedback feature allows the implantee to control and actuate th y.

omplete Patent Information

f 66 low-earth orbiting (LEO) satellites comprising the Iridium satellite system. The original company went bankrupt so the US Department of Defense the system stayed in operation. The system is currently maintained by the Boeing Company.

gram of the planetary coverage of the Iridum system. This system has transmit and receive coverage of the entire planet. Each circle is a coverage sector.

ere are many other forms of electronic harassment not mentioned here, but the most common forms of electronic harassment that you may likely encount d. Please read Microwave Detection - Remote Mind Control Technology for more on this subject.

oms of Electronic Radiation Exposure

may include but are not limited to: Headache, eye irritation, dizziness, nausea, skin rash, facial swelling, weakness, fatigue, pain in joints and/or muscles, ing in ears, skin numbness, abdominal pressure and pain, breathing difficulty, irregular heartbeat, sexual stimulation and hearing voices (see Patent #4,8 ymptoms have been reported in some individuals such as paralysis, balance problems, body and/or muscle spasms, convulsions, confusion,depression, di g, seizure, sleep disturbances, and memory difficulties.

Can Be Done To Protect Against Electronic Harassment?

nse, there isn't too much that can be done. You could change your venue, relocate or move to avoid the harasser but this isn't usually a practical method f

the best thing to do is give us a call from a secure phone. We will conduct a sweep of the suspect areas to locate the source of the suspected harassment a urse of action to stop the harassment.

acles are cheap and effective in blocking most X-rays and microwave or RF (could be a radar gun) signals that a harasser might use. Mountains, caves, d es or oceans offer excellent protection and can block or distort most forms of electronic harassment.

gnals with Passive or Active shielding can be an effective measure.

t is general to an area and not specifically directed to you, simply moving to another location is the easiest method to stop the harassment. If the harassm ou, then you'll need to employ some sort of shield or cover, such as mountains or a cave. Shielding may be your only alternative to stop the harassment if ral obstacles or shields. Passive shielding is less expensive then Active shielding and consists of special metal materials designed to block high frequenc ys, etc. Active shielding uses sophisticated electronic equipment to jam, capture, redirect, distort or nullify the harmful energy.

for a private individual, a company or a corporation to use electronic harassment on you. The military and law enforcement, however, can use non-lethal tle 50 Chapter 32 Section 1520a).

ing of electronic equipment; discovering unauthorized electronic surveillance; training of intelligence personnel by officers the United States is allowed.

ding any other provision of this subchapter, officers, employees, or agents of the United States are authorized in the normal course of their official duties rveillance not targeted against the communications of any particular person or persons, under procedures approved by the Attorney General.

lectronic Security Co. is an experienced and knowledgeable professional private investigative agency with the ability to find and then help you to elimina arassment. Advanced Electronic Security Co. is also a specialist in electronic surveillance and counter-surveillance. We only utilize the best and latest te es to assist and support victims of Electronic Harassment.

323-462-1351 - Los Angeles

760-668-2245 - Cell Phone

E-mail us

Over 30 years of specialized service over 2,500 locations swept.



Select show from list below to play, click on green arrow.