Sie sind auf Seite 1von 13

Email or Phone Sign Up Keep me logged in

Password Log In Forgot your password?

What is gang stalking ? What is cointelpro ? B.Simon


January 28, 2013 at 5:31am

The perpetrators of gang stalking are serious criminals who do great damage, and the acts done are very serious crimes by any measure. Gang stalking is a highly criminal campaign, one directed at a target individual, and one that aims to destroy an innocent persons life through covert harassments, malicious slander and carefully crafted and executedpsychological assaults. This harassment includes electronic mind/body attacks, street harassment skits, destruction of family and other relationships and destruction of careers.

Targeted by perpetrators on Cointelpro, Webmaster, Sanitizer, Protectionist, Scientist, Truther, Killer at Auto-defense, Denonciation, Assainissement Notes by Benjamin Simon All Notes

Benjamin Simon

TAGGED

Get Notes via RSS Embed Post

Gang stalking deprives the targeted individual of their basic constitutional rights and destroys their freedom, setting a stage for the destruction of a person, socially, mental and physical, through a ceaseless assault that pervades all areas of a persons life.What drives such campaigns may be revenge for whistleblowing, or for highly critical individuals, as outspoken people have become targets. http://geeldon.wordpress.com/2010/09/22/gang-stalking-described/ The criminals planning a gang stalking endeavor study the target long before the stalking begins. Psychological profiling is done, and this is to assist in the overall campaign that includes intense psychological harassments and demoralizations.Tactics used go well beyond fear, demoralization and psychological harassment. http://informport.blogspot.be/ For example, the perpetrators (who appear to frequently have access to their targets homes) may sometimes come into the house while the target is out and move things around a little bit, or spread some dirt on the floor or on furniture, or move an item from the house to the car. But usually they wont cause enough damage to involve the Police. This shows that this activity is a psychological game of cat and mouse, and has little to do with any overt kind of damage that may be caused, such as burning someones house down or stealing valuables. In some cases, the target doesnt know s/he is being targeted. It just looks as though the world is full of very rude people, and everything s/he owns breaks constantly (bad luck). According to Lawson, the perpetrators dont need the target to know s/he is targeted in order to fill the need within themselves that they are in control. http://educate-yourself.org/cn/gangstalkingoverview15sep06.shtml One especially invasive attack method in the arena of psycho-electronic mind control is voice to skull. Voice to skull is the transmission of voice, or any other audible or subliminal sound, directly into the hearing sense of the mind control victim. This is sometimes done around the clock and can be one of the severest forms of torture. Voice to skull technology is sometimes referred to as synthetic telepathy. Eleanor White http://www.raven1.net/

The buzzsaw is a powerful system of censorship in this country that is revealed to those reporting on extremely sensitive stories, usually having to do with high level government or corporate malfeasance. It often has a fatal effect on ones career. A journalist who has been through the buzzsaw is usually described as radioactive , which is another word for unemployable.

http://www.opednews.com/ http://www.nazis.be/The-perpetrator-cointelpro.html http://fr.scribd.com/doc/97582308/Benjamin-SIMON-CV-Gang-Stalking-Coveruphttp://emhdf.com/appeal.html WHY PINK FLOYD ?

H-waves, Hacheuse, Digital, Troughts, Perpetrators, Rotshild, Surveillance, Domestic terrorism, Snitching, Chemtrails, Tapping, Subvocal, People Cookers, Masint, Maser, Triangle, TM-SW7905, Diffraction, Echelon, Multi-victims, Stalking, Waves guides, WHY PINK FLOYD ? Pink floyd fight exactly this terrorism....I am one of the first fan of Waters, I have almost all his records on vinyls... but before being gang stalked I did not understand it .The wall is the movie I've seen the most times and before to be a victim and have problems with cointelpro and stalkers.

What is a Perpetrator? A Perpetrator is anyone who has been trained to harass, torture, maim, and kill a Target, either by direct means, or by covert means including, electronic, biological,or accidental means. Career perps make a good living dealing misery to hapless individuals. Perps usually do not know the victim personally, but are supplied enough information to allow a well oiled campaign of gang stalking and harassment. Dr Allen Barker http://emhdf.com Chain Reaction What is clear after researching theinformant system is that there is achain reaction happening insociety and that chain reaction is at the heart of much of the corruption that we are seeing in our legal system and other sectors of society. This system is responsible for enslaving and transforming large portions of communities into informants. Once a target is turned into an informant they in turn are sent back out into society to recruit, entrap, and turn others into informants. Many in society are not aware that this is happening. When it comes to Gang Stalking many people feel that it would be impossible or just too expensive to have someone monitored and placed under surveillance 24/7, much less arranging to have them tracked this way when they move or change jobs, but what research into the informant system and the chain reaction that is occurring within society has shown is that it is very possible. This chain reaction that is happening within society if left unchecked has the potential to infect and destroy the very core of society that we know and are dependent upon. The informant system is an infection on the soul of society and if not cured it could in time become malignant to the very society it was designed to assist. Gmb Bailey http://www.GangstalkingWorld.com Groep-stalking Oorsprong: Groepstalking is een fenomeen dat waarschijnlijk oorspronkelijk in de VS is

ontwikkeld door de KuKluxKlan en gebruikt wordt om ongewenste elementen uit hun omgeving te verdrijven.Doel van groepstalking: zelfmoord Groepstalking komt voor in westerse landen en is een onderdeel van een verfijnde methode om mensen uit te schakelen. Het slachtoffer moet geisoleerd worden, werkeloos, uitgeput en (financieel) afhankelijk gemaakt, maar vooral buitenzinnen worden gebracht. Het doel van deze methode (met groepstalking als onderdeel van), is dat het slachtoffer zelfmoord pleegt, gepsychiatriseerd raakt, zijn buren aanvalt en/of vermoord, e.d. Dus, de geestelijke en/of lichamelijke dood van het slachtoffer. Dat maakt degenen die hier aan meewerken medeplichtig aan moord met voorbedachten rade of anders gezegd, moordenaars. Het is belangrijk te realiseren dat de meeste mensen die dit aangedaan wordt niet eens zullen begrijpen wat hun precies overkomt. Peter Mooring http://www.petermooring.nl Domestic War Rooms- C2 Center Military campaigns have been typically directed from war rooms. They are also called command centers, or command and control centers (C2). A C2 center is a military term for a station which allows the planning, direction and control of operations, monitoring,decisionmaking, and execution.The word communications was added to this term, making it C3, and eventually computers were added, amounting to C4. It is now referred to as C4ISR with the addition of intelligence, surveillance, and reconnaissance.4 A more detailed explanation of this term follows.Command is the formulation of intent such as planning, control is the information obtained from the results of the action taken, as well as the conclusion as to whether or not the action was successful. Communications and computers are the hardware and software used to implement the command and control.Intelligence, surveillance, and reconnaissance are the hardware and software systems of sensors, people, data collectors, and platforms as well as the use of tools to extract the information from data. These are collectively referred to as C4ISR. M Rich http://www.thehiddenevil.com/

Domestic war room, C2 to C4, Silent sound, La langouste ne passera pas, elf, radio waves, sanguine, screener, digitaliser, hacheuse, Cuba, France, mayonnaise Silent Sound Technology S-quad Silent (converted-to-voice AM) hypnosis can be transmitted using a voice frequency modulator to generate thevoice. It is a steady tone, near the high end of

hearing range (15,000 Hz), plus a hypnotists voice, varying from 300 4,000 Hz. These two signals are frequency modulated. The output now appears as a steady tone, like tinnitus,but with hypnosis embedded. The FM-voice controls the timing of the transmitters pulse.Dr Richard Allan Miller http://richardalanmiller.com/

Nasa: specialists of subvocal bands , lads and domestic (sigint) surveillance low frequencies. Ecologist and VS terrorism http://www.nasa.gov/ Through-wall surveillance methods: This includes top end of microwave (near infrared), and the so-calledmillimeter wave scanning. This method uses the very top end of the microwave radio signal spectrum just below infrared. To view small objects or people clearly, the highest frequency that will penetrate non-conductive or poorly-conductive walls is used.Millimeter wave scanning radar can be used in two modes: The first is passive (no radiated signal) and uses background radiation already in the area to be scanned. It is totally undetectable. The active system uses a (low power millimeter wave) flashlight attached to the scanner. Dr Richard Allan Miller http://richardalanmiller.com/ EMF Brain Stimulation It works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brains neuralcircuits. EMF Brain Stimulation can also change a persons brain-states and affect motor control.Two-way Electronic Brain-Link is done by remotely monitoring neural audiovisual information whiletransmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). http://www.freedomfchs.com/remoteneuralmonitoring.pdf http://fr.spirou.wikia.com/wiki/Zorglonde The pigs exploit your desperation . You are under torture. You are rightfully desperate. The bad Nazi is harassing you. So the good Nazi has an opportunity. The good Nazi keeps promising to help you. As a torture victim, you tend to keep paying attention to the good Nazi, because there is no alternative. In the real world no one even knows (or admits to knowing) what is going on. You are under an intolerable torture. The good Nazi exploits this. The good Nazi can even turn bad Nazi from time to time and the victim will stay tuned in, because that seems to be the only hope. The good Nazi will promise help and anything else, as long as it is only between the lines or otherwise deniable. The good Nazi can appear on any FIP, for example as another voice on the nonconsensual voicetoskull send. Or it might be a collaborator on a normally legitimate channel pigs at a Mockingbird newspaper, for example. But if you buy the bait they dangle to a desperate human being under torture, they then start trying to manipulate you. Whoops! If only you hadnt done that! Well, your freedom was all lined up if you hadnt done that! Your basic human rights will be restored soon, if only you willNazis pig theorem.Part IV: Bayesian Stopping Critireon and the Optimization Thereom, Dr Allen Barker . http://targetedindividualscanada.wordpress.com/2012/02/15/allen-l-barker-2/allen-barker/ http://targetedindividualscanada.wordpress.com/2010/07/02/how-electronic-harassment/

OS/EH Organised Stalking /Electronic Harassment , Structure of the network Silent weapons for quiet wars An introductory programming manual,Operations Research,Technical Manual TM-SW7905.1 This publication marks the 25th anniversary of the Third World War, called the Quiet War,being conducted using subjective biological warfare, fought with silent weapons.This book contains an introductory description of this war, its strategies, and its weaponry.It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of u nlimited social power was a possibility only decades away.The combination was irresistible. The Quiet War was quietly declared by the International Elite at a meeting held in 1954. This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world. Google search: silent sound, quiet war,, false flags, dirty little game, harassment, mind blowing, TM-SW7905.1, OS/EH? H waves, sanguine, human monitoring. http://emhdf.com http://gangstalkingbelgium.files.wordpress.com/2012/11/elf-eeg-entrainment-sanguine-hpsychotronic-monarch.pdf http://gangstalkingbelgium.files.wordpress.com/2012/11/sharp-maser-silent-weapons-forquiet-wars-rotchil-technical-manual-tm-sw7905-1.pdf

The primary psychiatric diagnostic manual used within the United States and many other western countries is the Diagnostic and Statistics Manual IV-TR (DSM-IVTR), which is written and published by the American Psychiatric Association (APA, 2000). Based on my understanding of its contents, which is informed somewhat by a Bachelor of Science degree in Psychology (non-clinical) and spending close to a decade in psychotherapy as a patient, people who claim that they are being stalked by multipleperpetrators could receive a diagnosis of persecutory delusional disorder or paranoid schizophrenia. Dr Robin B. Webster http://www.gang-stalking.be/Gang-stalking-Neo-nazis-Sanguine-MonarkPerpetrator/PDF/Victims-of-Organized-Stalking-Delusional-Schizophrenic-or-the-Targets-ofPsychiatric-Persecution.pdf

Linvalidation de certains phnomnes comme le stalking organisationnel par les forces de lordre et les psychiatres au profit dallgations fallacieuses sur le dlire de perscution ou la schizophrnie nous semblent des postulats dpasss lheure de la radiogoniomtrie, de lexistence des nacelles de contrle visuel quipant les chasseurs (le Rafale, le Mirage, le F16, etc.)et de lensemble de moyens de surveillance dont dispose lindustrie policire et scuritaire. Les Cahiers du journalisme, N.Desurmont (belgian criminologist) http://classiques.uqac.ca/contemporains/desurmont_nicolas/desurmont_nicolas.html http://deflem.blogspot.be/2008/08/terrorism-domestic-spying-2008.html . PETITION -OVER-1300-TORTURE-CASES. This letter is to ask for your help for the many victims who are being attacked with Psychotronic (or Mind Control,Electronic, Directed Energy, Neurological, Non-lethal) Weapons. Some of our ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION CASES detail the most extreme and totalitarian violations of human rights in human history, including the most horrendous psychological tortures, rapes, sexual abuse, physical assaults, surgical mutilations, mind control, and other mental and physical mutilations. Among other things the perpetrators of these crimes can place the human subject under continuous surveillance no matter where he/she is; they can monitor the human brain, including thoughts, reactions, motor commands, auditory events and visual images; they can continuously alter consciousness, introduce voices, noises, other disturbances, commands, images and dreams into the brain; and they can directly abuse, torture and hit bodies includingperforming advanced medical procedures from remote locations. The technology they are using is so advanced that it allows the controller(s) to see through the eyes of the targeted individual, essentially seeing whatever the victim sees. Many of us are being tortured and abused in these ways 24 hours a day, 7 days a week year in year out. http://www.4shared.com/office/4_jeTjle/PETITION_-_TO_YOU_OUR_SELECTED.html

Waves, torture, radio-frequences, elf, monarch, mk-ultra, remote in fluencing of human body

Diffrents droits nationaux rglementent l'usage des armes lectromagntiques. Ils incriminent dans certains cas leur utilisation aux fins de harclement. Le harclement lectromagntique est en effet une nouvelle forme de criminalit apparue suite au dveloppement de nouvelles armes, techniques et appareils. Louis Freyheit. http://www.net-iris.fr/blog-juridique/145-louis-freyheit/30374/droit-compare-duharcelement-electromagnetique-necessite-une-loi-francaise

Electronic torture, rape, gang stalking...by Jewel Krayan

Alain Winants (Sret de lEtat) : La Belgique fait un peu ple figure Pour Alain Winants, administrateur gnral de la Sret de lEtat, les cyberattaques constates jusquici en Belgique, bien quelles soient en recrudescence, nont pas encore montr de cas de cybersabotage , qui rsulte dans la destruction de matriel ou de donnes (comme ce fut le cas en Iran avec Stuxnet). Mais en matire de cyberscurit, notre pays est bel et bien en retard.Quand une administration comme les Affaires trangres est aujourdhui attaque, qui trouve ton derrire ces attaques ?La Belgique est elle capable de se dfendre ?Il ny a pas encore au niveau belge de plan de cyberscurit gnral dans lequel la Sret pourrait sinscrire avec dautres partenaires, et dans le cadre duquel nous pourrions nous rpartir les tches. La Sret, seule, nest pas mme dassurer ce genre de responsabilit : elle doit travailler avec le SGRS, le FCCU (NDLR : Federal Computer Crime Unit), etc. On est en train dlaborer depuis un certain temps dj, au niveau du gouvernement, un plan gnral dans lequel il faudra tout la fois prendre en considration les cyberattaques, la cyberdfense, la cyberscurit et la protection physique des infrastructures critiques. Le soir, Lalleman A. http://www.gang-stalking.be/Gang-stalking-Neo-nazis-Sanguine-MonarkPerpetrator/PDF/Belgique-une-cible-trop-facile-en-cas-de-cybersabotage-Alain-WinantLALLEMAND-20-juin-2012.pdf http://rense.com/general17/biophysicalwarfare.htm http://www.facebook.com/notes/benjamin-simon/about-devices-to-worm-and-perpetratorsplaying-patterns-of-gang-stalking-the-per/10200272382600071

Le vif: le-midi-du-vif/buzz-polemiques-web-la-liberte-d-expression-devient-sovietisation http://www.levif.be/info/levif-blog/le-midi-du-vif/buzz-polemiques-web-la-liberte-dexpression-devient-sovietisation/opinie-4000207761553.htm Gang stalking = man-in-the-middle attack, spoofing. Techniques applique par les terroristes dans ltendue du spectre electromagntique et pour tout les moyens de communications non physiques et francs. (recording + speech to word to speech recognition in real time, e-mailing,web, gsm, radios, forums, facebook, fax, mailing, databases, banks, inssurances ..).http://gangstalkingbelgium.wordpress.com/Computer security, the man-in-the-middle attack (often abbreviated MITM)[1] is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-themiddle). From Wikipedia, the free encyclopediaTo begin the attack the perpetrator can put a link to the false WWW (a copy) on a website that they know the target visits. Or they can send the target an email with a link to the false web. They may also be able to get their false web indexed on a search engine. These attacks can be launched using an unwitting persons PC as a proxy which would conceal the location of the perpetrators. Most of the clues that would alert a target that their web has been spoofed can be concealed. One is the status line located at the bottom of most browsers, which provides the address of a web site thats in the process of loading. Normally, if a user clicks on a site, the status line reveals the actual site being loaded, regardless of the label on the hyperlink that was

clicked. Also, the URL location line at the top of most browsers where sites can be typed in, will display the current site. Mark Rich

Intrusion dans mon pc, harassments informatiques snapshot, Komposer, avec les commentaires par v2s + Fishing permanent , surtout ds facebook. Le domaine C4ISTAR (Command, Control, Communications and Computers for Intelligence, Surveillance, Target Acquisition and Reconnaissance) regroupe une large gamme de sous-domaines et de technologies et touche diffrents types de donnes (voix, images, vidos, fichiers, messages, fax). Il participe la ralisation du concept Network Enabled Capability (NEC).Lamlioration constante des systmes C4ISTAR reste un domaine dintrt. Quelles que soient leurs localisation et dimension, la structure de commandement et les circonstances, il envisage lintgration rseau-centre, automatique, cohrente, souple, modulaire, adaptable, agile et flexible de dtecteurs, de systmes C2, de vecteurs et deffecteurs, et lamlioration de la diffusion, du partage et du traitement de linformation. Les systmes Command and Control (C2) doivent permettre dobtenir une meilleure capacit ISTAR en oprations. Ils doivent surveiller lenvironnement scuritaire,faire de la prvention, identifier et neutraliser les menaces et contenir leurs effets leur minimum, protger les infrastructures et zones sensibles.Dans le domaine des communications, cette niche comprend le spectre complet des communications (sans fil) et les diffrentes manires de scuriser diffrents niveaux ces communications. Pour des applications militaires, ces rseaux doivent tre robustes, lgers, fiables et interoprables tous les niveaux oprationnels sans perdre de vue les aspects de self-configurability ,de redondance et de qualit de services et les mesures de guerre lectronique et de cyberwarfare ou CNO (ComputerNetwork Operations). Au sein de la dfense, laccent est mis sur les applications NCO (Network Centric Operations),le tout en rseau , le tout sur IP (Internet Protocol) tant au niveau services que rseaux, fixes et/ou (semi-)mobiles, civils et/ou militaires dont par exemple le programme dacquisition de la radio du futur: la SDR (Software Defined Radio).Appel_a_projets_F_2012,Jean-Paul MARCEL http://www.irsd.be http://gangstalkingbelgium.net/2012/08/16/la-these-de-l4irsd-appel-a-projet-2012command-and-control-cno-counter-terrorism-warfare/ . NEWS/ OPEN MIND CONFERENCE 2012 20-23 SEPTEMBER / DENMARK / SKANDERBORG / AUDONICONICAACT.ORG is honored to have the opportunity to participate in a gathering of some of the brightest minds of today.We have been asked to give a presentation addressing Remote Influencing Technologies, The New Terrorism of the 21st Century. Special guest will include Dr. Barrie Trower (British Physicist), Niels Harrit (Chemistry Professor), Rasmus Foldbjerg (Molecular Biologist), Lars Drudgaard (ICAACT), and others of prestiege and influence. ICAACT is committed to educating the public and representing victims of electronic terrorism throughout the globe. http://www.icaact.org/

WELCOME TO ICAACT.ORG, domestic terrorism, the crime of the 21 century, JESSE BELTRAN , DR. JOHN R. HALL D.O.,DR. EDWARD L. SPENCER MD, MELANIE VRITSCHAN, LARS DRUDGAARD, CARMEN LUPAN, WENDY NEWMAN, BARRIE TROWER

Jai tout les lments depuis longtemps pour que ces ordures soient croues, . .sans contacts ni mme un papier officiel malgr ces 3 ans denfer et ces deux ans et demi de travail temps plein week-end en sus. Je suis scientifique de formation et je dispose des meilleures rfrences y compris par rapport a ce travail qui me fait vomir. Mais la Belgique nest pas l.Jai tout les lments pour que ces ordures soient crous, ..sans contacts ni mme un papier officiel malgr ces 3 ans denfer et ces deux ans et demi de travail temps plein week-end en sus. Mais la Belgique nest pas l. http://gangstalkingbelgium.wordpress.com/aux-autorites-nationales http://gangstalkingbelgium.net/presse/documentation/

Le 6 octobre 2012, Je me suis rendu un meeting luniversit de Ghent organis par http://icaact.org/. (Jesse Beltram, Barrie Trowers, Lars Drudgaard, ) Luniversit mettait aimablement ses locaux et sa chambre anchoique notre diposition et deux spcialistes trangers quip du matriel de mesure had-oc et bien sur brevet et calibr ont effectu les mesures. Les rsultats montrent que je suis vis accroch au niveau des tempes gauches et droites par une arme a nergie dirige emettant du silent sound sur une frquence trs prcise (chiffres exacts et vido de la sance de mesure disponible).

sensitive areas to microwaves, voice to skull, LADS Nous tions une douzaine pour lesquels les mesures taient positives ainsi que quelques temoins. Cette technique de harassment verbal se nome voice to skull. Le silent sound est larme par excellence de la guerre avec des armes nergie dirige emit par des ordures pour le tracking, le mind-blowing, lespionnage ainsi que la torture physique.(echelon, tempest, mkultra, monarch, illuminati terrorism, ..) interview by Transparent Flemish-Dutch Radio. http://icaact.org/audio/brusselsradio.mp3

Des btards mont assassins et je nai pas daide pourtant je les aila police Cinacienne nen veut pas et ma laiss dans une situation de grand danger alors que je leur ai balanc ce rseau en aot 2011 sous forme de 3.5 Gigas de documents et de preuves (1 an et demi de travail afin de pouvoir dposer et propos dun assassinat decouvert lors de cette recherche). Comme je leur ai indiqu ce dossier exigeait ma dclaration et un minimum de collaboration pour tre efficient. Malgr mes post-insistances, un papier officiel, dautres dclarations en rapport direct avec ce dossier, un quatre yeux, un minimum de franchise, ont t impossible obtenir, et pire.

Le 11 novembre 2012. La semaine dernire, suite a une convocation emanant de lagent qui javais remis le dossier, cest un toubib gnraliste qui est arriv au poste. Il ma questionn a propos dune photo de revolver! (www.gang-stalking.be),de mes possibles assutudes (heroine !!!!), de lusage du mot nazis . Il ma demand si je marquerais mon accord quant un sjour en hpital psychiatrique, une mdication, un suivi par un psychiatre. Cette entrevue venait dune demande du parquet de Dinant (une convocation d'un Juge d'insruction arrive le meme jour qu'une convocation de la part du Procureur) suite un pais courrier que jaurais envoy la Substitute du Procureur du Roi ? Le fait est que je nai rien envoy cette dame, la police ma empech de le dire, je nai pu voir lpais dossier en question. Une preuve de dmarche judiciaire ma encore t refuse !!! http://gangstalkingbelgium.net/2012/01/28/httpwww-policelocale-be5314/ http://gangstalkingbelgium.net/2012/11/23/special-dedicace-a-madame-la-substitute-duprocureur-du-roi-dehttp://fr.scribd.com/doc/102015551/Monsieur-Appart-Procureur-Du-Roi-Dinant-GangStalking-Publique

Benjamin Simon 0032497615904 http://www.scribd.com/doc/97582308/Benjamin-SIMON-CV-Gang-Stalking-Cover-up Benjamin Simon 46b Corbion 5590 Ciney (stalked). 27 ruelle Burton, Gesves (to find me) http://gangstalkingbelgium.wordpress.com/ http://peacepink.ning.com/profile/bsimon http://www.scribd.com/bensim24 http://www.scribd.com/bensim23 http://www.chauffage-indusriel.be/ http://gangstalkingenwallonie.blogspot.be/ http://gangstalkingbelgique.blogs.dhnet.be/ http://www.gang-stalking.be/ http://www.linkedin.com/pub/simon-benjamin/50/337/5a1

Support needed

http://www.timelex.eu/fr/blog http://www.apfn.org/apfn/swqw.htm http://prasad519.blogspot.in/ http://martinacable99.wordpress.com/2012/11/04/targeted-individuals-psychotronicsanonymous/ http://lissakr11humanelife.wordpress.com/ http://shopofenlightenment.com/forum/psychotronic-technologies-as-silent-weaponst1422.html http://www.elfis.net/elfol6/e6mkc.htm http://geeldon.wordpress.com/2011/02/20/maser-beams-reading-subvocalised-thoughts/ http://tesla.stumblers.net/ http://saiinssiet.blogspot.be/p/blog-page.html http://www.qsl.net/w5www/taoshum.html http://tallbloke.wordpress.com/2011/07/07/the-luxembourg-effect/ http://psychicinvestigator.com/demo/http://metaphysicalradionics.com/ http://www.illuminati-news.com/index.htm http://www.plusultratech.com/2010/11/psychotronic-warfare.html http://nexusilluminati.blogspot.be/ http://www.mindthemoon.com/ http://www.pakalertpress.com/2012/04/08/putin-reportedly-confirms-that-russia-is-activelyworking-on-psychotronic-weapons/#oogleto: http://en.wikipedia.org/wiki/Project_Sanguine http://www.vxm.com/bib.doc.html http://cryptome.org/The Succor Punch Orgone Generators http://ce399.wordpress.com/ http://www.polyphasemicrowave.com/ http://www.rma.ac.be/

http://www.zp5314.be/ http://www.mil.be/def/index.asp http://www.misbehavedwoman.wordpress.com http://www.powersthatbeat.wordpress.com http://www.neverending1.wordpress.com http://geeldon.wordpress.com/2011/09/06/ http://www.blacklistednews.com http://www.mindcontroljustice.wordpress.com http://www.gangstalkingbelgium.wordpress.com

Ark. judge fines Johnson & Johnson more than $1.1B in Risperdal case (cbsnews.com)J&J Marketed Risperdal to Kids Despite Warnings, Jurors Told (businessweek.com)A+KIDS: Important Information for Children with ASD who Receive Behavior http://www.autismsocietyofnc.wordpress.com The Marketing of antipsychotic Risperdal to kids: I was by now fully alert and fighting the impulse to stand up and say, Are you serious? the trial http://www.bipolarsoupkitchen-stephany.blogspot.com Newborn infants experience withdrawal from psychiatric drugs http://www.beyondmeds.com Gang Stalking Hand signals used by Nazis and still used today in U.S.(http://www.neverending1.wordpress.com) http://www.hearingvoices-is-voicetoskull.com/ Dendermonde https://vimeo.com/53944720 Vervier http://stefanievandevelde88.wix.com/falkor-one#!introduction-to-falkor-one/ Anvers https://www.facebook.com/andrea.laroche.77 BXL http://icaact.org/about-icaact.html#.UPmFdtfUqVs BXL .....LA LISTE EST BCP PLUS LONGUE.....voir http://gangstalkingbelgium.net/

Operation Antenne, l'Andenne

Share JazmyneLove Angel, Michael Castro, Daniel E. Shaffer Jr. and 7 others like this. Benjamin Simon salut Louis, je cite ton excellent article See Translation January 28 at 5:39am 1 Benjamin Simon Pink floyd fight exactly this terrorism....I am one of the first fan of Waters, I have almost all his records on vinyls... but before being gang stalked I did not understand it The wall is the film I've seen the most times and before these problems January 28 at 11:42am 2 Vincent Miller im being stalked on tv and internet as well. January 29 at 9:49pm Rudi Wendt I didn't read everthing in this article, and I really didn't want to put myself out there. I have and am going through some of the problems in this article. The picture of Pink Floyd with the smoking Power Plant or,( what ever plant it may be), Reeaally hit home. 8/30/2013. August 30 at 12:33am 1 Daniel E. Shaffer Jr. I actually was sitting in the Coffee shop today, and reading your blog, "What is Gang Stalking?" I was surfing around on the internet and read your blog. Now it is on facebook. Each time something different I read triggers off a memory. Alot of things... See More September 20 at 10:33pm Benjamin Simon http://www.nowpublic.com/... WHO IS GETTING THOUSANDS OF GANG STALKING REPORTS A MONTH? | NowPublic News Coverage www.nowpublic.com WHO IS GETTING THOUSANDS OF GANG STALKING REPORTS A MONTH? September 30 at 9:52am JazmyneLove Angel http://www.youtube.com/channel/UCicytRKxP05UHTDtgJLcIg

11 Shares

JazmyneLove Angel www.youtube.com

October 4 at 2:18pm via mobile

Mobile About

Find Friends Create Ad

Badges Create Page

People Developers

Pages Careers

Places Privacy

Apps Cookies

Games Terms

Music Help

Facebook 2013 English (US)

Das könnte Ihnen auch gefallen